Information Technology Reference
In-Depth Information
The OpenSolaris Immutable Service Containers project can be found at http://
hub.opensolaris.org/bin/view/Project+isc/ . It includes sample config-
urations and describes methods for autonomic self-assessment, self-cleansing,
self-quarantining, self-rollback, and self-destruction.
The Center for Internet Security describes steps to disable individual Solaris
services, including network and non-network services: www.sun.com/
security/docs/CIS_Solaris_10_Benchmark_v4.pdf
Glenn Brunette documented the use and hardening of the Solaris NTP ser-
vice in a three-part BluePrints document:
Part I: Introduction to NTP :
http://www.sun.com/blueprints/0701/NTP.pdf
Part II: Basic NTP Administration and Architecture :
http://www.sun.com/blueprints/0801/NTPpt2.pdf
Part III: NTP Monitoring and Troubleshooting :
www.sun.com/blueprints/0901/NTPpt3.pdf
“Understanding the Security Capabilities of Solaris Zones Software” by
Glenn Brunette and Jeff Victor provides a comprehensive view of security
and Solaris Containers:
http://wikis.sun.com/display/BluePrints/Understanding+the+
Security+Capabilities+of+Solaris+Zones+Software
Solaris IP Filter documentation: http://docs.sun.com/app/docs/
doc/816-4554/ipsectm-1?l=en&a=view
Privilege Debugging Tool project: http://hub.opensolaris.org/bin/
view/Community+Group+security/privdebug
8.8 Summary
This chapter provided detailed steps to achieve various goals using Oracle's sys-
tem virtualization technologies. Many other possible uses exist.
 
 
 
Search WWH ::




Custom Search