Chapter 6
Securing the Server
93
The special capabilities of these key sequences are automatically disabled 30 seconds
after the Sun copyright message is displayed. Once the capability is disabled, the key
sequences operate as normal control keys.
Because of the risk that the security of the SC could be compromised by
unauthorized access to the RTOS shell, you should control access to the serial ports
of the SC.
Domain Minimization
One way to contribute to the security of a Netra 1290 server is to tailor the
installation of software to an essential minimum. By limiting the number of software
components installed on each domain (called
domain minimization
), you can reduce
the risks of security holes that can be exploited by potential intruders.
For a detailed discussion of minimization, with examples, see
Minimizing Domains
for Sun Fire V1280, 6800, 12K, and 15K Systems
(two-part article) available onlin
e
at:
http://www.sun.com/security/blueprints
Solaris Operating System Security
For information on securing the Solaris Operating System, see the following books
and articles:
■
Solaris Security Best Practices
– available online at:
http://www.sun.com/software/security/blueprints
■
Solaris Security Toolkit
– available online at:
http://www.sun.com/software/security/jass
■
Solaris 8 System Administration Supplement
or the
System Administration Guide:
Security Services
in the Solaris 9 System Administrator Collection
Содержание Netra 1290
Страница 12: ...xii Netra 1290 Server System Administration Guide May 2006...
Страница 32: ...14 Netra 1290 Server System Administration Guide May 2006...
Страница 48: ...30 Netra 1290 Server System Administration Guide May 2006...
Страница 80: ...62 Netra 1290 Server System Administration Guide May 2006...
Страница 104: ...86 Netra 1290 Server System Administration Guide May 2006...
Страница 112: ...94 Netra 1290 Server System Administration Guide May 2006...
Страница 142: ...124 Netra 1290 Server System Administration Guide May 2006...