Understanding Software Security
Most hardware security is implemented through software measures. These sections provide
general software security guidelines for the servers.
■
“Prevent Unauthorized Access (Oracle Solaris OS)” on page 11
■
“Prevent Unauthorized Access (Oracle ILOM)” on page 11
■
“Prevent Unauthorized Access (Oracle VM Server for SPARC)” on page 12
■
“Restricting Access (OBP)” on page 12
■
“Oracle System Firmware” on page 15
■
Prevent Unauthorized Access (Oracle Solaris OS)
Use Oracle Solaris OS commands to restrict access to the Oracle Solaris
software, harden the OS, use security features, and protect applications.
Obtain the
Oracle Solaris Security Guidelines
document for the version you are using at:
■
http://www.oracle.com/goto/solaris11/docs
■
http://www.oracle.com/goto/solaris10/docs
Prevent Unauthorized Access (Oracle ILOM)
1.
Use Oracle ILOM commands to restrict access to the Oracle ILOM software,
change the factory-set password, limit the use of the root superuser account,
and secure the private network to the service processor.
Obtain the
Oracle ILOM Security Guide
at:
http://www.oracle.com/goto/ilom/docs
2.
When possible, use the platform-specific Oracle ILOM commands to secure
individual domains by creating user accounts with roles that apply to a specific
physical domain.
Understanding Software Security
11