Go to main content

Oracle® Solaris 11.3 Security and Hardening Guidelines

Exit Print View

Updated: March 2018
 
 

Securing System Access and Use

You can configure Oracle Solaris security features to protect your system use, including applications and services on the system and on the network.

Table 6  Securing System Access and Use Task Map
Task
Description
For Instructions
Prevent programs from heap or executable stack corruption.
Verifies that security extensions that protect the stack and heap from compromise are enabled.
Configure auditing.
Customizes audit configuration for coverage and file integrity.
Protect core files that might contain sensitive information.
Creates a directory with limited access that is dedicated to core files.
Protect a web server with SSL Kernel Proxy.
The Secure Sockets Layer (SSL) protocol can be used to encrypt and accelerate web server communications.
Protect legacy services with privileges and authorizations.
Runs applications with least privilege by assigning limited rights to the application.
Create zones to contain applications.
Zones are containers that isolate processes. They can isolate applications and parts of applications. For example, zones can be used to separate a web site's database from the site's web server.
Create and administer immutable zones.
You can administer an immutable zone, but you must take specific steps to enable administration.
Manage resources in zones.
Zones provide a number of tools to manage zone resources.

Protecting a Legacy Service With SMF

You can limit application configuration to trusted users or roles by adding the application to the Service Management Facility (SMF) feature of Oracle Solaris, then requiring rights to start, refresh, and stop the service.

For services that are run by inetd, you should control the number of concurrent processes to prevent a security breach. For more information, see Recommendations for Configuring Systems That Run inetd Based Services in Administering TCP/IP Networks, IPMP, and IP Tunnels in Oracle Solaris 11.3.

Configuring a Kerberos Network

You can protect your network with the Kerberos service. This client-server architecture provides secure transactions over networks. The service offers strong user authentication, as well as integrity and privacy. Using the Kerberos service, you can log in to other systems, execute commands, exchange data, and transfer files securely. Additionally, the service enables administrators to restrict access to services and systems. As a Kerberos user, you can regulate other people's access to your account.