Summary

If your particular system or environment requires stricter control over authorized users’ actions, mandatory access control, or other additional security features provided by Trusted Solaris 8, you might want to consider using Trusted Solaris instead of standard Solaris. However, users and system administrators alike must be aware of the additional requirements imposed by Trusted Solaris 8 on both the hardware and the users. Although Trusted Solaris 8 is based on Solaris, it nevertheless has many concepts and features unknown in standard Solaris. Thus, users and system administrators need additional training to administer and use Trusted Solaris systems. Hardware requirements for a server that is to run Trusted Solaris 8 are also higher: ...

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.