Summary

This chapter looked at the many system configuration options and approaches intended to increase the security of Solaris 8 systems. Much of the advice contained here is applicable in almost every circumstance. However, a number of things might not be appropriate for all sites, such as disabling some services or using certain settings. In case you cannot disable a particular service, make sure that you at least control access to it and keep detailed logs. And remember that any system is as secure as its weakest part.

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.