Solaris 10 Security Essentials
Prentice Hall, 2009 - Computers - 272 pages
Direct from Sun's experts: all the practical information needed to secure any Solaris 10 system, in one concise book
•Rock-solid reliable information for securing Solaris 10 in any environment, on any platform.
•Covers all areas of Solaris 10 security: roles, privileges, cryptography, network security, auditing, authentication, Zones, Trusted Extensions, and much more
•An indispensable resource for every new and experienced Solaris sysadmin and security professional This concise, practical book brings together all the information system administrators need to secure Solaris 10 successfully in any environment, large or small, on any hardware platform. Authored by a team of security experts at Sun Microsystems, this book offers rock-solid reliable information on every facet of Solaris security: both day-to-day tasks and the occasional tasks that are rarely performed, but must be handled correctly the first time. This book is packed with step-by-step guidance, tested examples, and expert troubleshooting solutions gleaned from real-world enterprise deployments. Topics covered include: making the right security decisions before and during installation; hardening the OS; protecting file systems; using roles and privileges, implementing cryptographic services, securing networks, authentication, auditing, utilizing Zones virtualization security, working with Trusted Extensions, and much more. A full chapter of example implementations present the anatomy of a typical attack and demonstrate how Solaris 10 security features can prevent it from succeeding. Solaris 10 Security Essentials assumes no previous experience with Solaris, making it ideal for thousands of system administrators and security specialists moving from other environments, such as Linux or Windows.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Solaris Security Services
System Protection with SMF
8 other sections not shown
ACLs apache2 applications assigned audit records authentication BART certiﬁcate chapter chmod client conﬁguration ﬁle Configuring create cryptographic framework daemon debug default deﬁned disabled enabled enabled enabled encryption example execute extended attributes ﬁle system ﬁltering ﬁrst following command global zone grep host installation interface IP Filter ipfilter IPsec Kerberos kernel keystore keytab label login manifest mode online online online OpenBoot OpenSolaris OpenSSL operating system options packets PAM modules password path/to/file permissions PKCS 11 port Printer Management privileges protocol prtadm RBAC remote rights proﬁle role Role-Based Access Control root script Secure Shell server Service Management Facility setuid shell Solaris Fingerprint Database Solaris operating system Solaris system speciﬁed stack Sun Microsystems SunSSH superuser SVC SVC SVC svcadm syslog telnet template Trusted Extensions UNIX user’s verify