Table of Contents
- Title and Copyright Information
- Using This Documentation
-
1
Managing Computer System Security
- What's New in Securing Systems and Devices in Oracle Solaris 11.4
- Controlling Access to a Computer System
-
Controlling Access to System Resources
- Using the Secure by Default Configuration
- Preventing Intentional Misuse of System Resources
- Limiting and Monitoring Superuser Access
- Configuring Role-Based Access Control to Replace Superuser
- Preventing Unintentional Misuse of System Resources
- Restricting setuid Executable Files
- Using Resource Management Features
- Using Oracle Solaris Zones
- Auditing System Use
- Monitoring Compliance
- Controlling Access to Files
- Controlling Access to Devices
- Controlling Network Access
- Reporting Security Problems
-
2
Protecting Oracle Solaris System Integrity
- Using Verified Boot
- Using Trusted Platform Module
- Using ILOM to Prevent Access to USB Ports
-
Protecting Against Malware With Security Extensions
- Randomizing the Layout of the Address Space
- Protecting the Process Heap and Executable Stacks From Compromise
- nxstack and noexec_user_stack Compatibility
- Preventing Process Heap Corruption Using adiheap
- ADI-Based Stack Protection Using adistack
- KADI for Kernel Debugging on ADI Systems
- Enabling Inheritance of Security Extension Status
- Specifying Per-Object Security Extensions
- Protecting Platforms Against Speculative Execution Attacks
- 3 Controlling Access to Systems
-
4
Controlling Access to Devices
- Configuring Device Policy
- Managing Device Allocation
- Allocating Devices
- Device Protection Reference
- 5 Scanning for Viruses
- 6 Systems and Devices Glossary
- Index