|Skip Navigation Links|
|Exit Print View|
|Trusted Extensions Label Administration Oracle Solaris 10 8/11 Information Library|
The management identifies an experienced administrator with the following qualifications:
Is assessed to be trustworthy
Knows how to administer Oracle Solaris systems
Understands the organization's information-processing goals well enough to be responsible for overseeing or implementing the site's security
That person is assigned the job of security administrator.
Long before installing Trusted Extensions software, the security administrator starts to learn about security and to prepare a plan for the site's security policy. First, the security administrator reads the following documents:
Chapter 1, Security Planning for Trusted Extensions, in Trusted Extensions Configuration Guide – For guidance on creating a site's security policy
Trusted Extensions User’s Guide – To become familiar with label types and appearance
Trusted Extensions Administrator’s Procedures – To become familiar with security administrator responsibilities and tools
Chapter 1, Labels in Trusted Extensions Software – To review label concepts
Then, the security administrator starts with a plan for the site's labels. The planning process is described in the following sections.