Understanding Software Security; Prevent Unauthorized Access (Oracle Solaris Os); Prevent Unauthorized Access (Oracle Ilom) - Oracle SPARC M8 Security Manual

Hide thumbs Also See for SPARC M8:
Table of Contents

Advertisement

Understanding Software Security

Most hardware security is implemented through software measures. These sections provide
general software security guidelines for the servers.
"Prevent Unauthorized Access (Oracle Solaris OS)" on page 11
"Prevent Unauthorized Access (Oracle ILOM)" on page 11
"Prevent Unauthorized Access (Oracle VM Server for SPARC)" on page 12
"Restricting Access (OBP)" on page 12
"Oracle System Firmware" on page 15
"Secure WAN Boot" on page 15

Prevent Unauthorized Access (Oracle Solaris OS)

Use Oracle Solaris OS commands to restrict access to the Oracle Solaris
software, harden the OS, use security features, and protect applications.
Obtain the Oracle Solaris Security Guidelines document for the version you are using at:
http://www.oracle.com/goto/solaris11/docs
http://www.oracle.com/goto/solaris10/docs

Prevent Unauthorized Access (Oracle ILOM)

1.
Use Oracle ILOM commands to restrict access to the Oracle ILOM software,
change the factory-set password, limit the use of the root superuser account,
and secure the private network to the service processor.
Obtain the Oracle ILOM Security Guide at:
http://www.oracle.com/goto/ilom/docs
When possible, use the platform-specific Oracle ILOM commands to secure
2.
individual domains by creating user accounts with roles that apply to a specific
physical domain.
Understanding Software Security
11

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sparc m7

Table of Contents