O'Reilly logo

Solaris™ 10 Security Essentials by Sun Microsystems Security Engineers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

11Zones Virtualization Security

The Solaris operating system employs an operating system virtualization technology called zones. This chapter focuses on security aspects of this technology. For example, the zones abstraction has significant security advantages because applications or servers run in a protected environment, isolated from all other applications on the system.

The applications that execute inside zones are also restricted in their ability to interact with privileged system processes or resources, because only a limited set of privileges are available to them. With the use of exclusive IP stack instances, different IPsec, packet filtering, and VLAN access policies can be employed for applications in different zones on the same machine. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required