Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity

Table Of Contents

Preface
CHAPTER1
Introduction
■“Securing Systems With the Solaris Security Toolkit Software” on page1
Securing Systems With the Solaris Security Toolkit Software
■“JumpStart Mode” on page2
JumpStart Mode
Stand-alone Mode
Understanding the Software Components
Directories
Documentation Directory
man Directory
Drivers Directory
OS Directory
Solaris OS
Packages Directory
Data Repository
Maintaining Version Control
Configuring and Customizing the Solaris Security Toolkit Software
Policies and Requirements
Guidelines
CHAPTER2
Securing Systems: Applying a Methodology
■“Planning and Preparing” on page17
Planning and Preparing
Considering Risks and Benefits
Reviewing Security Policy, Standards, and Related Documentation
Example 1
Example 2
Determining Application and Service Requirements
Identifying Application and Operational Service Inventory
Determining Service Requirements
■“Shared Libraries” on page21
Service Frameworks
Developing and Implementing a Solaris Security Toolkit Profile
Installing the Software
Performing Preinstallation Tasks
Backing Up Data
Verifying System Stability
Performing the Post-installation Task
Verifying Application and Service Functionality
Verifying Security Profile Installation
Verifying Application and Service Functionality
Maintaining System Security
CHAPTER3
Upgrading, Installing, and Running Security Software
Performing Planning and Preinstallation Tasks
Software Dependencies
Determining Which Mode to Use
Upgrading Procedures
▼ To Upgrade Solaris Security Toolkit Software Only
Upgrading the Solaris OS Only
Downloading Security Software
■“Downloading Solaris Security Toolkit Software” on page40
Downloading Solaris Security Toolkit Software
Downloading Recommended Patch Cluster Software
Downloading FixModes Software
▼ To Download FixModes Software
Downloading OpenSSH Software
▼ To Download OpenSSH Software
Downloading the MD5 Software
▼ To Download the MD5 Software
Customizing Security Profiles
Installing and Executing the Software
■“Executing the Software in Stand-alone Mode” on page48
Executing the Software in Stand-alone Mode
▼ To Execute the Software in Stand-alone Mode
Driver Option
Execute History Option
Most Recent Execute Option
Root Directory Option
Undo Option
Executing the Software in JumpStart Mode
▼ To Execute the Software in JumpStart Mode
See “Validating the System Modifications” on page60
Validating the System Modifications
Performing QA Checks of Services
Performing Security Assessments of Configuration
Validating Security Profile
CHAPTER4
Reversing System Changes
■“Understanding How Changes Are Logged and Reversed” on page63
Understanding How Changes Are Logged and Reversed
Requirements for Undoing System Changes
Customizing Scripts to Undo Changes
Checking for Files That Were Manually Changed
Using Options With the Undo Feature
Backup Option
Force Option
Keep Option
Output File Option
Quiet Output Option
Email Notification Option
Undoing System Changes
▼ To Undo a Solaris Security Toolkit Run
CHAPTER5
Configuring and Managing JumpStart Servers
Configuring JumpStart Servers and Environments
▼ To Configure for JumpStart Mode
Using JumpStart Profile Templates
core.profile
end-user.profile
developer.profile
entire-distribution.profile
oem.profile
minimal-SunFire_Domain*.profile
Adding and Removing Clients
CHAPTER6
Auditing System Security
■“Maintaining Security” on page87
Maintaining Security
Reviewing Security Prior to Hardening
Customizing Security Audits
Preparing to Audit Security
Using Options and Controlling Audit Output
Command-Line Options
■“Display Help Option” on page91
Banners and Messages Output
Host Name, Script Name, and Timestamp Output
Performing a Security Audit
▼ To Perform a Security Audit
CHAPTER7
Securing a System
■“Planning and Preparing” on page103
Assumptions and Limitations
System Environment
Security Requirements
Creating a Security Profile
■“Downloading and Installing Security Software” on page106
Downloading and Installing Security Software
▼ To Download and Install the Security Software
Installing Patches
▼ To Install Patches
Specifying and Installing the OS Cluster
▼ To Specify and Install the OS Cluster
1.Specify the OS cluster to install
Configuring the JumpStart Server and Client
Preparing the Infrastructure
▼ To Prepare the Infrastructure
Validating and Checking the Rules File
Customizing the Hardening Configuration
■“Enabling FTP Service” on page115
■“Enabling RPC Service” on page117
Enabling FTP Service
▼ To Enable FTP Service
Installing Secure Shell Software
▼ To Install Secure Shell
Enabling RPC Service
▼ To Enable RPC
Installing the Client
▼ To Install the Client
Testing for Quality Assurance
▼ To Verify Profile Installation
▼ To Verify Application and Service Functionality
Glossary
Index
0 of .
Results for:
No results containing your search query
P. 1
819-1402-10

819-1402-10

Ratings: (0)|Views: 37 |Likes:
Published by udaych2385

More info:

Published by: udaych2385 on Aug 30, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/30/2011

pdf

text

original

You're Reading a Free Preview
Pages 4 to 5 are not shown in this preview.
You're Reading a Free Preview
Pages 9 to 76 are not shown in this preview.
You're Reading a Free Preview
Pages 80 to 115 are not shown in this preview.
You're Reading a Free Preview
Pages 119 to 123 are not shown in this preview.
You're Reading a Free Preview
Pages 127 to 164 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->