Overview of System Security

The first line of security defense is to control access to systems. You can control and monitor system access in the following ways.

  • Maintain physical site security.

  • Maintain login control.

  • Restrict access to data in files.

  • Maintain network control.

  • Monitor system use.

  • Set the path variable correctly.

  • Monitor setuid and setgid programs.

  • Track superuser (root) login.

  • Install a firewall.

  • Report security problems.

  • Use the Automated Security Enhancement Tool (ASET).

  • Use role-based access control (RBAC) to grant users rights to perform specific system administration tasks without full superuser access.

Maintaining Physical Site Security ...

Get Solaris™ 8 Advanced System Administrator's Guide, Third Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.