Skip Navigation Links | |
Exit Print View | |
Trusted Extensions Label Administration Oracle Solaris 11.1 Information Library |
1. Labels in Trusted Extensions (Overview)
2. Planning Labels in Trusted Extensions (Tasks)
3. Creating a Label Encodings File (Tasks)
4. Labeling Printer Output (Tasks)
5. Customizing the LOCAL DEFINITIONS Section (Tasks)
6. Planning an Organization's Encodings File (Example)
Identifying the Site's Label Requirements
Satisfying Information Protection Goals
Trusted Extensions Features That Address Labeling and Access
Analyzing the Requirements for Each Label
Requirements for CONFIDENTIAL: INTERNAL_USE_ONLY
Requirements for CONFIDENTIAL: NEED_TO_KNOW
Requirements for CONFIDENTIAL: REGISTERED
Names of Groups With NEED_TO_KNOW Label
Understanding the Set of Labels
Planning the Use of Words in MAC
Planning the Use of Words in Labeling System Output
Planning Unlabeled Printer Output
Planning for Supporting Procedures
Rules for Protecting a REGISTERED File or Directory
Rules for Configuring Printers
Rules for Handling Printer Output
Planning the Classification Values in a Worksheet
Planning the Compartment Values and Combination Constraints in a Worksheet
Planning the Clearances in a Worksheet
Planning the Printer Banners in a Worksheet
Planning the Channels in a Worksheet
Planning the Minimum Labels in an Accreditation Range
Planning the Colors in a Worksheet
Editing and Installing the label_encodings File
Specifying the Classifications
Specifying the Sensitivity Labels
Specifying the Information Labels
Specifying the Printer Banners
Specifying the Accreditation Range
Specifying the Local Definitions
Specifying the Default User Labels
Configuring Users and Printers for Labels
The manager in charge of information protection identifies an experienced administrator with the following qualifications:
Is assessed to be trustworthy
Knows how to administer Oracle Solaris systems
Understands the organization's information-processing goals well enough to be responsible for overseeing and implementing the site's security
That person is assigned the job of security administrator.
Long before configuring Trusted Extensions, the security administrator starts to learn about security and to prepare a plan for the site's security policy. First, the security administrator reads the following documents:
Chapter 1, Security Planning for Trusted Extensions, in Trusted Extensions Configuration and Administration – For guidance on creating a site's security policy
Trusted Extensions User’s Guide – To become familiar with label types and label appearance
Trusted Extensions Configuration and Administration – To become familiar with security administrator responsibilities and tools
Chapter 1, Labels in Trusted Extensions (Overview) – To review label concepts
Then, the security administrator starts with a plan for the site's labels. The planning process is described in the following sections.