oracle home
Oracle
®
Solaris 11 Security Guidelines
Exit Print View
Search Term
Search Scope:
This Document
Entire Library
» ...
Documentation Home
»
Oracle Solaris 11.2 Information Library
»
Oracle
®
Solaris 11 Security ...
»
About Oracle Solaris Security
»
Protecting Data
Updated: August 2014
Oracle
®
Solaris 11 Security Guidelines
Document Information
Using This Documentation
Product Documentation Library
Access to Oracle Support
Feedback
Chapter 1 About Oracle Solaris Security
What's New in Security Features in Oracle Solaris 11.2
Oracle Solaris 11 Security After Installation
System Access Is Limited and Monitored
Kernel, File, and Desktop Protections Are in Place
Oracle Hardware Management Package
Oracle Solaris Configurable Security
Protecting Data
File Permissions and Access Control Entries
Cryptographic Services
Oracle Solaris ZFS File System
Java Cryptography Extension
Protecting and Isolating Applications
Privileges in Oracle Solaris
Oracle Solaris Zones
Address Space Layout Randomization
Service Management Facility
Protecting Users and Assigning Additional Rights
Passwords and Password Constraints
Pluggable Authentication Modules
User Rights Management
Securing Network Communications
Packet Filtering
Firewall
TCP Wrappers
Remote Access
IPsec and IKE
Secure Shell
Kerberos Service
Maintaining System Security
Verified Boot
Package Integrity Verification
Audit Service
File Integrity Verification
Log Files
Compliance to Security Standards
Labeled Security
Trusted Extensions Feature in Oracle Solaris
Labeled Filesystem
Labeled Network Communications
Trusted Extensions Multilevel Desktop
Oracle Solaris 11 Common Criteria EAL4+ Certification
Site Security Policy and Practice
Chapter 2 Configuring Oracle Solaris Security
Installing the Oracle Solaris OS
Initially Securing the System
How to Verify Your Packages
How to Verify That ASLR Is Enabled
How to Disable Unneeded Services
How to Remove Power Management Capability From Users
How to Place a Security Message in Banner Files
How to Place a Security Message on the Desktop Login Screen
Securing Users
How to Set Stronger Password Constraints
How to Set Account Locking for Regular Users
How to Set a More Restrictive umask Value for Regular Users
How to Audit Significant Events in Addition to Login/Logout
How to Remove Unneeded Basic Privileges From Users
Protecting the Network
How to Use TCP Wrappers
Protecting File Systems
How to Limit the Size of the tmpfs File System
Protecting and Modifying Files
Securing System Access and Use
Protecting a Legacy Service With SMF
Configuring a Kerberos Network
Adding Labeled Multilevel Security
Configuring Trusted Extensions
Configuring Labeled IPsec
Chapter 3 Maintaining and Monitoring Oracle Solaris Security
Maintaining and Monitoring System Security
Verifying File Integrity by Using BART
Using the Audit Service
Monitoring Audit Records in Real Time
Reviewing and Archiving Audit Logs
Appendix A Bibliography for Oracle Solaris Security
Security References on the Oracle Technology Network
Oracle Solaris Security References in Third-Party Publications
Language:
English
Protecting Data
Oracle Solaris protects data from booting through installation, use, and archiving.
Previous
Next