Go to main content

Oracle® Solaris 11.3 Security and Hardening Guidelines

Exit Print View

Updated: March 2018
 
 

Initially Securing the System

The following tasks are best performed in order. At this point, the Oracle Solaris operating system is installed and only the initial user who can assume the root role has access to the system.

Table 1  Securing the System Task Map
Task
Description
For Instructions
1. Verify the packages on the system.
Checks that the packages are valid. Also checks the signatures on signed packages.
2. Ensure that executables are protected.
Verifies that security extensions that protect the stack and heap from compromise are enabled.
3. Safeguard the hardware settings on the system.
Protects hardware by requiring a password to change hardware settings. On an x86 system, access to the GRUB menu is controlled. On a SPARC system, the eeprom command protects the hardware.
4. Disable unneeded services.
Prevents processes that are not part of the system's required functions from running.
5. Prevent the workstation owner from powering down the system.
Prevents the Console User from shutting down or suspending the system.
6. Create a login warning message that reflects your site's security policy.
Notifies users before and after authentication that the system is monitored.