|Skip Navigation Links|
|Exit Print View|
|Oracle Solaris 10 Security Guidelines Oracle Solaris 10 8/11 Information Library|
The following two documents describe how to harden Oracle Solaris, how to use its security features to configure your systems to operate securely when you add applications and users to the systems, and how to use particular security features to protect network-based applications. A short description accompanies each document title.
CIS Solaris 10 Benchmark v5.0.0, 9 July 2010.
Another name for this document is Security Configuration Benchmark for Solaris 10 11/06 through 10/09. This benchmark is the result of over seven years of work by many contributors, including Sun Microsystems, the Defense Information Systems Agency (DISA), the Center for Internet Security (CIS), the National Institute of Standards and Technology (NIST), the National Security Agency (NSA), and many individual enterprises, academic institutions, and individuals. This benchmark establishes a set of baseline hardening guidance that Sun, CIS, NSA, and DISA agreed to.
An Overview of Solaris 10 Operating System Security Controls, Glenn Brunette, September 2007, v1.0
This appendix to the Security Configuration Benchmark for Solaris 10 11/06 through 10/09 focuses on the security controls in Oracle Solaris 10 that fall outside of the area of system hardening and security configuration validation. This appendix provides a complete overview of the security features and capabilities of Oracle Solaris 10 and offers specific recommendations, where possible.