Initially Securing the System
The following tasks are best performed in order. At this point, the Oracle Solaris operating system
is installed and only the initial user who can assume the root role
has access to the system.
Table 1 Securing the System Task Map
| | |
1. Verify the packages on the system.
| Checks that the packages are valid. Also checks the signatures on signed
packages.
|
|
2. Ensure that executables are protected. |
Verifies that security extensions that protect the stack and
heap from compromise are enabled.
|
|
3. Safeguard the hardware settings on the system.
| Protects hardware by requiring a password to change hardware settings. On
an x86 system, access to the GRUB menu is controlled. On a
SPARC system, the eeprom command protects the hardware.
|
|
4. Disable unneeded services.
| Prevents processes that are not part of the system's required functions
from running.
|
|
5. Prevent the workstation owner from powering down the system.
| Prevents the Console User from shutting down or suspending the system.
|
|
6. Create a login warning message that reflects your site's security
policy.
| Notifies users before and after authentication that the system is monitored.
|
|
|