Skip Navigation Links | |
Exit Print View | |
Oracle Solaris 11 Security Guidelines Oracle Solaris 11.1 Information Library |
1. Overview of Oracle Solaris Security
Oracle Solaris Security Protections
Oracle Solaris Security Technologies
Address Space Layout Randomization
File Permissions and Access Control Entries
Passwords and Password Constraints
Pluggable Authentication Module
Oracle Solaris ZFS File System
Oracle Solaris 11 Security Defaults
System Access Is Limited and Monitored
Kernel, File, and Desktop Protections Are in Place
Additional Security Features Are in Place
Oracle Solaris 11 Security Evaluation
2. Configuring Oracle Solaris Security
For a secure system or network of systems, your site must have a security policy in place with security practices that support the policy. If you are developing programs or installing third-party programs, you must develop and install those programs securely.
For more information, review the following: