The manager in charge of information protection identifies an experienced administrator with the following qualifications:
Is assessed to be trustworthy
Knows how to administer Oracle Solaris systems
Understands the organization's information-processing goals well enough to be responsible for overseeing and implementing the site's security
That person is assigned the job of security administrator.
Long before configuring Trusted Extensions, the security administrator starts to learn about security and to prepare a plan for the site's security policy. First, the security administrator reads the following documents:
Chapter 1, Security Planning for Trusted Extensions in Trusted Extensions Configuration and Administration – For guidance on creating a site's security policy
Trusted Extensions Configuration and Administration – To become familiar with security administrator responsibilities and tools
About Labels in Trusted Extensions – To review label concepts
Then, the security administrator starts with a plan for the site's labels. The planning process is described in the following sections.