11Zones Virtualization Security

The Solaris operating system employs an operating system virtualization technology called zones. This chapter focuses on security aspects of this technology. For example, the zones abstraction has significant security advantages because applications or servers run in a protected environment, isolated from all other applications on the system.

The applications that execute inside zones are also restricted in their ability to interact with privileged system processes or resources, because only a limited set of privileges are available to them. With the use of exclusive IP stack instances, different IPsec, packet filtering, and VLAN access policies can be employed for applications in different zones on the same machine. ...

Get Solaris™ 10 Security Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.