2 Configuring Oracle Solaris Security

This chapter describes the actions to take to configure security on your system. The chapter covers installing packages, configuring the system itself, then configuring various subsystems and additional applications that you might need, such as IPsec.

Installing the Oracle Solaris OS

The Oracle Solaris OS is installed by selecting a set of packages called a group from a package repository. Different groups supply packages for different uses, such as multipurpose servers, minimally installed or hardened systems, and desktop systems. Packages are signed and their secure transfer can be verified.

When you install the Oracle Solaris OS, choose the media that installs the appropriate group package, as follows:

  • Oracle Solaris Large Server – Both the default manifest in an Automated Installer (AI) installation and the text installer install the group/system/solaris-large-server group, which provides an Oracle Solaris large server environment.

  • Oracle Solaris Small Server – The Automated Installer (AI) installation and the text installer optionally install the group/system/solaris-small-server group, which provides a useful command-line environment to which you can add packages.

  • Oracle Solaris Minimal Server – The Automated Installer (AI) installation and the text installer optionally install the group/system/solaris-minimal-server group, which provides a minimal command-line environment to which you can add just the packages that you want. This group can provide the base for a hardened system.

  • Oracle Solaris Desktop – The AI can install the group/system/solaris-desktop group. Alternatively, after using the text installer, add the solaris-desktop package to provide an Oracle Solaris 11.4 desktop environment.

To automate installation with the Automated Installer (AI), see . You can secure AI installations with certificates and keys for the install server, for specified client systems, for all clients of a specified install service, and for any other AI clients.

To guide your media choice, see the following installation and package content guides:

Initially Securing the System

The following tasks are best performed in order. At this point, the Oracle Solaris OS is installed and only the initial user who can assume the root role has access to the system.

  1. Check that packages and their signatures are valid – Verifying Packages and Fixing Verification Errors in Updating Systems and Adding Software in Oracle Solaris 11.4

  2. Ensure that security extensions protect executables – Preventing Intentional Misuse of System Resources in Securing Systems and Attached Devices in Oracle Solaris 11.4

  3. Safeguard the hardware settings on the system – Controlling Access to System Hardware in Securing Systems and Attached Devices in Oracle Solaris 11.4

  4. Disable unneeded services – Stopping a Service in Managing System Services in Oracle Solaris 11.4

  5. Prevent the workstation owner from powering down the system – How to Remove Power Management Capability From Users in Securing Users and Processes in Oracle Solaris 11.4

  6. Notify users before and after authentication that the system is monitored – How to Place a Security Message in Banner Files in Securing Systems and Attached Devices in Oracle Solaris 11.4

Securing Users

At this point, only the initial user who can assume the root role can access the system. The following tasks are best performed in order before regular users can log in.

  1. (Optional) Configure restrictive file permissions for regular users – How to Set a More Restrictive umask Value for Regular Users in Securing Users and Processes in Oracle Solaris 11.4

  2. Set account locking for regular users – How to Set Account Locking for Regular Users in Securing Users and Processes in Oracle Solaris 11.4

  3. Monitor and record all administrative events – Viewing Audit Data in the Statistics Store in Managing Auditing in Oracle Solaris 11.4

  4. Distribute discrete administrative tasks to roles – Assigning Rights to Users in Securing Users and Processes in Oracle Solaris 11.4

    For ease of role creation, use predefined ARMOR roles – Creating a Role in Securing Users and Processes in Oracle Solaris 11.4

  5. (Optional) Limit a user's basic privileges – Removing Privileges From Users in Securing Users and Processes in Oracle Solaris 11.4

Protecting the Network

At this point, you might have created users who can assume roles, and have created the roles.

In your assigned role as network security administrator, perform tasks from the following list that site security requires. These network tasks strengthen the IP, ARP, and TCP protocols.

Protecting File Systems

ZFS file systems are lightweight and can be encrypted, compressed, and configured with reserved space and disk space quotas. The tmpfs file system can grow without bound.

The following tasks configure ZFS and tmpfs so provide a glimpse of the protections that are available in ZFS.

Protecting and Modifying Files

By default, only the root role can modify system file permissions. Roles and users who are assigned the solaris.admin.edit/ path-to-system-file authorization can modify that system-file. Only the root role can search for all files.

The following tasks illustrate several strategies for protecting the files in your system.

Securing System Access and Use

You can configure Oracle Solaris security features to protect your system use, including applications and services on the system and on the network.

Protecting SMF Services

You can limit application configuration to trusted users or roles by adding the application to the Service Management Facility (SMF) feature of Oracle Solaris, then requiring rights to start, refresh, and stop the service.

For services that are run by inetd, you should control the number of concurrent processes to prevent a security breach. For more information, see the following:

For information and procedures about SMF, see the following:

Adding Labeled Security

Labeled security in Oracle Solaris is provided by two features, file and process labeling in Oracle Solaris, and the Trusted Extensions feature that is provided in an optional set of packages.