HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Courses > Solaris Security
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Solaris Security  
> Access to the content HTML Beginning of the course  
> Description Solaris is doubtless the most widespread Unix system in professional environment. Its maturity and robustness make it a first class system for Internet access platforms, e-commerce platforms and many critical applications. However, Solaris is not a secure system by default and work is required in order to set up a Solaris system that will be accessed through a public network such as the Internet.

The objective of this course is to show how to setup a Solaris system securely.  

> Context & Dates This academic talk helped us to design our course material, February 4th-5th session.
The sessions to come of the course Solaris Security always feature updated course material.
 
> Author Jean-Jacques Bernard 
> Type Course material - [ - ]  
> Abstract &
Table of content
Page de garde

Plan
Historique
Les risques
Exemples de problèmes récents

Sécurisation de la procédure de démarrage (OpenBoot PROM)
Installation du système
Exemple
Tâches post-installation
Suppression et ajout de packages
Amélioration de la configuration par défaut

cron et at
Amélioration des journaux
Comptabilité et audit

Utilisateurs
Gestion du mot de passe
Authentification
PAM
Groupes
Accès aux ressources

Système de fichiers
Fichiers sensibles
Contrôle d'intégrité
Solaris Fingerprint Database (sfpDB)

ASET
JASS

SSH
NTP
Durcissement de la pile IP
Récapitulatif de la sécurité de la pile TCP/IP
Filtrage IP
IPFilter
SunScreen Lite

Points divers
Rappels
Conclusion
Références  

> Related documents
themeSolaris
[Course]  Solaris Security
[Tip]  Installing OpenSSH under Solaris [29 October 2001 - French]
[Theme]  Unix
> Copyright © 2002, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 24 November 2003 at 10:49:34 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants