This section highlights information for existing customers about important new features in this release that secure systems and devices from unauthorized access.
Verified boot controls boot policy through one property, boot_policy. See Controlling Access to Boot Processes
You can configure verified boot on Kernel Zones. See Using Verified Boot to Secure an Oracle Solaris Kernel Zone in Creating and Using Oracle Solaris Kernel Zones.
Security extensions in the kernel protect systems from compromise and you can verify whether a binary is protected by them. See Protecting Against Malware With Security Extensions.
You can protect your system from attacks that exploit USB connections on platforms that use Oracle Integrated Lights Out Manager (ILOM) firmware. See Controlling Access to USB Ports.