55
CHAPTER
5
Securing the Server
This chapter provides important information about securing the system, explains
security recommendations, discusses domain minimization, and provides references
to Solaris Operating System security.
This chapter includes the following topics:
■ “Security Guidelines” on page 55
■ “Selecting a Remote Connection Type” on page 57
■ “Additional Security Considerations” on page 60
Security Guidelines
The following are security practices to consider:
■ Ensure that all passwords comply with security guidelines.
■ Change your passwords on a regular basis.
■ Scrutinize log files on a regular basis for any irregularities.
The practice of configuring a system to limit unauthorized access is called hardening.
There are several configuration steps that can contribute to hardening your system.
These steps are guidelines for system configuration:
■ Implement security modifications immediately after updating the Sun Fire™
Real-Time Operating System (RTOS) and SC application firmware, and before
configuring or installing any Sun Fire domains.
■ In general, restrict access to the SC operating system, RTOS.
■ Limit physical access to serial ports.
■ Expect to reboot, depending upon the configuration changes.