JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris 11 Security Guidelines     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

1.  Overview of Oracle Solaris Security

Oracle Solaris Security Protections

Oracle Solaris Security Technologies

Address Space Layout Randomization

Audit Service

BART File Verification

Cryptographic Services

File Permissions and Access Control Entries

Packet Filtering

IP Filter

TCP Wrappers

Passwords and Password Constraints

Pluggable Authentication Module

Privileges in Oracle Solaris

Remote Access

IPsec and IKE

Secure Shell

Kerberos Service

Role-Based Access Control

Service Management Facility

Oracle Solaris ZFS File System

Oracle Solaris Zones

Trusted Extensions

Oracle Solaris 11 Security Defaults

System Access Is Limited and Monitored

Kernel, File, and Desktop Protections Are in Place

Additional Security Features Are in Place

Oracle Solaris 11 Security Evaluation

Site Security Policy and Practice

2.  Configuring Oracle Solaris Security

3.  Monitoring and Maintaining Oracle Solaris Security

A.  Bibliography for Oracle Solaris Security

Oracle Solaris Security Protections

Oracle Solaris provides a solid foundation for company data and applications by protecting data on disk and in transit. Oracle Solaris resource management and Oracle Solaris Zones provide features that separate and protect applications from misuse. This containment, together with least privilege implemented through privileges and the role-based access control (RBAC) feature of Oracle Solaris, reduce the security risk of intruder or regular user actions. Authenticated and encrypted protocols such as IP security (IPsec) provide virtual private networks (VPNs) across the Internet, as well as tunnels within a LAN or a WAN for safe data delivery. Additionally, the auditing feature of Oracle Solaris ensures that records are kept of any activity of interest.

Oracle Solaris 11 security services provide defense in depth by offering layers of protection for the system and the network. Oracle Solaris protects the kernel by limiting, within kernel utilities, what privileged actions the utility can perform. The default network configuration provides data protection on the system and across the wire. IPsec, the IP Filter feature of Oracle Solaris, and Kerberos can provide additional protections.

Oracle Solaris security services include: