Further Hardening Labeled File Systems
Although applying labels can prevent inadvertent access by privileged users, the label configuration can be compromised by modifying the underlying configuration, loading untrusted software, or modifying the kernel. To improve the robustness of the label policy, you can isolate labeled file systems in zones, use immutable zones, and store your audit records and core dumps in a labeled file system.