JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris 10 Security Guidelines     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

1.  Oracle Solaris 10 Security Guidelines

Preface

This guide provides pointers to and descriptions of security guidelines for the Oracle Solaris operating system (Oracle Solaris OS). The system hardening references describe how to harden Oracle Solaris 10 systems and how to use Oracle Solaris security features to protect your data and applications. You can tailor the recommendations in these references to your site security policy.

Additionally, this guide provides pointers to background information about Oracle Solaris security, and white papers that guide you through common implementations.

Audience

The Oracle Solaris 10 Security Guidelines is intended for security administrators and other administrators who perform the following tasks:

To use this guide, you must have general knowledge of UNIX administration, a good foundation in software security, and knowledge of your site security policy.

Related Third-Party Web Site References

Third-party URLs are referenced in this document and provide additional, related information.

Oracle is not responsible for the availability of third-party web sites mentioned in this document. Oracle does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Oracle is not responsible or liable for any actual or alleged damage or loss caused by or in connection with the use of or reliance on any such content, goods, or services that are available on or through such sites or resources.

Access to Oracle Support

Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

Typographic Conventions

The following table describes the typographic conventions that are used in this book.

Table P-1 Typographic Conventions

Typeface
Meaning
Example
AaBbCc123
The names of commands, files, and directories, and onscreen computer output
Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123
What you type, contrasted with onscreen computer output
machine_name% su

Password:

aabbcc123
Placeholder: replace with a real name or value
The command to remove a file is rm filename.
AaBbCc123
Book titles, new terms, and terms to be emphasized
Read Chapter 6 in the User's Guide.

A cache is a copy that is stored locally.

Do not save the file.

Note: Some emphasized items appear bold online.

Shell Prompts in Command Examples

The following table shows the default UNIX system prompt and superuser prompt for shells that are included in the Oracle Solaris OS. Note that the default system prompt that is displayed in command examples varies, depending on the Oracle Solaris release.

Table P-2 Shell Prompts

Shell
Prompt
Bash shell, Korn shell, and Bourne shell
$
Bash shell, Korn shell, and Bourne shell for superuser
#
C shell
machine_name%
C shell for superuser
machine_name#