|Skip Navigation Links|
|Exit Print View|
|Oracle Solaris 11 Security Guidelines Oracle Solaris 11.1 Information Library|
1. Overview of Oracle Solaris Security
2. Configuring Oracle Solaris Security
3. Monitoring and Maintaining Oracle Solaris Security
This guide presents security guidelines for the Oracle Solaris operating system (Oracle Solaris OS). First, the guide describes security issues that an enterprise OS must address. Then, it describes the default security features of the Oracle Solaris OS. Finally, the guide provides specific steps to take to harden the system and to use Oracle Solaris security features to protect your data and applications. You can tailor the recommendations in this guide to your site security policy.
Oracle Solaris 11 Security Guidelines is intended for security administrators and other administrators who perform the following tasks:
Analyze security requirements
Implement site security policy in software
Install and configure the Oracle Solaris OS
Maintain system and network security
To use this guide, you must have general knowledge of UNIX administration, a good foundation in software security, and knowledge of your site security policy.
Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
The following table describes the typographic conventions that are used in this book.
Table P-1 Typographic Conventions
The following table shows UNIX system prompts and superuser prompts for shells that are included in the Oracle Solaris OS. In command examples, the shell prompt indicates whether the command should be executed by a regular user or a user with privileges.
Table P-2 Shell Prompts