Software Security
Software Security
Most hardware security is implemented through software measures.
- When a new system is installed, change all default passwords. Most types of equipment use default passwords, such as
changeme
, that are widely known and would allow unauthorized access to the equipment. Also, devices such as network switches can have multiple user accounts by default. Be sure to change all account passwords. - Use a dedicated network for service processors to separate them from the general network.
- Protect access to USB consoles. Devices such as system controllers, power distribution units (PDUs), and network switches can have USB connections, which can provide more powerful access than SSH connections.
- Refer to the documentation that came with your software to enable any security features available for the software.
- A server can boot securely with WAN Boot or iSCSI Boot.▪ For an Oracle Solaris 10 release, refer to the Oracle Solaris Installation Guide: Network-Based Installations book▪ For an Oracle Solaris 11 release, refer to the Installing Oracle Solaris 11 Systems book for WAN Boot information and the System Administration Guide: Basic Administration book for iSCSI boot information.
The Oracle Solaris Security Guidelines document provides information on:
- How to harden Oracle Solaris
- How to use Oracle Solaris security features when configuring your systems
- How to operate securely when you add applications and users to a system
- How to protect network-based applications
Oracle Solaris Security Guidelines documents can be found at:
< Previous Page | Next Page >