O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

System Security Checklist

  • Install the Solaris 8 operating environment and applications from the original CD-ROM media.

  • Do not use the upgrade procedure. Do a fresh installation.

  • Assign every user his or her own personal account.

  • Make sure all accounts have passwords.

  • Make sure that users don’t share passwords. Tell them that this is for their own good.

  • Make sure no two accounts have the same user ID (UID).

  • Use “good” passwords. (See Chapter 1, “Enterprise Security Framework,” for more information.)

  • If possible, generate passwords automatically. (Consider using genpass, described in Chapter 7, “open source Security Tools.”)

  • Use the root account as little as possible.

  • Periodically scan your entire file system for SUID/SGID files, and save the lists. Any ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required