Talk With an Expert

Securing Solaris

Securing Solaris (PDF, 1.63MB)Published: 02 Oct, 2000
Created by
Angela Orebaugh

When configuring a Solaris system for production, a balance must exist between system manageability and security. It is necessary to determine the role the system will play in order to determine what services it needs to run. The objective is to keep things simple. By dedicating separate machines for different tasks, it is expected that only one or two services will run on a host. This methodology makes it easier to isolate applications, harden, and troubleshoot. This type of minimalist approach runs only what is absolutely necessary. Keeping a Solaris system secure is a daily task. This includes keeping up on exploits, patches, and reviewing log files. The following suggestions are just the beginning to securing your Solaris system. There are some additional steps that may need to be taken depending on the systems role in the organization, and some of the steps listed may not apply. Consulting the listed references for additional information is highly recommended.