Information Technology Reference
In-Depth Information
The OpenSolaris Immutable Service Containers project can be found at
http://
hub.opensolaris.org/bin/view/Project+isc/
.
It includes sample config-
urations and describes methods for autonomic self-assessment, self-cleansing,
self-quarantining, self-rollback, and self-destruction.
■
The Center for Internet Security describes steps to disable individual Solaris
■
Glenn Brunette documented the use and hardening of the Solaris NTP ser-
vice in a three-part BluePrints document:
■
Part I: Introduction to NTP
:
■
Part II: Basic NTP Administration and Architecture
:
■
Part III: NTP Monitoring and Troubleshooting
:
■
“Understanding the Security Capabilities of Solaris Zones Software” by
Glenn Brunette and Jeff Victor provides a comprehensive view of security
and Solaris Containers:
■
Solaris IP Filter documentation:
http://docs.sun.com/app/docs/
■
Privilege Debugging Tool project:
http://hub.opensolaris.org/bin/
view/Community+Group+security/privdebug
■
8.8 Summary
This chapter provided detailed steps to achieve various goals using Oracle's sys-
tem virtualization technologies. Many other possible uses exist.
Search WWH ::
Custom Search