Configuring for Security

Installing Solaris from scratch and applying the latest patches is just the start. Now it is time to configure your Solaris 8 system in a secure manner. This involves changing some default settings and making the required modifications in configuration files. As stated a moment ago, not all changes are appropriate on all systems. Before applying any of these recommendations, carefully consider the implications for your site.

Accounts and Passwords

Although the next chapter is dedicated to authentication and authorization in Solaris, the following sections describe the minimum required modifications.

Delete Unnecessary Accounts

Using userdel or passmgmt, remove the accounts that are not and will not be used on your ...

Get Solaris 8 Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.