Evaluating the Efficiency of Security Measures
This is one of the most forgotten steps. After you have configured or reconfigured something, it is a good idea to stop, check, and see whether it works as it should. Here is a list of suggested checks:
Check important files (such as /etc/passwd and /etc/shadow) periodically.
Check account usage data for unusual patterns (strange connection times, places, and so on).
Check newly installed systems for correct configuration. Pay special attention to security-related settings.
Categorize systems into different categories by importance (normal, high, maximum), and check whether security is appropriate for each group.
Make sure authentication and authorization work as expected, for both local and remote ...
Get Solaris 8 Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.