User's Manual

Solaris 9 Security CX-310-301 7
Using File Listings .................................................................................................................. 40
Using Checksums .................................................................................................................. 40
Using File Digests .................................................................................................................. 40
Using the find Command........................................................................................................ 41
Using Tripwire......................................................................................................................... 42
Kernel Trust and OpenBoot .......................................................................................................45
OpenBoot ............................................................................................................................... 45
File and System Resources Protection....................................................................... 46
User Account Protection ............................................................................................................ 46
Checking for Duplicate Accounts ........................................................................................... 46
Expiring Accounts................................................................................................................... 46
Restricting root Logins............................................................................................................ 48
Dormant Accounts.................................................................................................................. 48
Protecting Passwords ................................................................................................................ 49
Recommendations for a Good Password .............................................................................. 49
Users with No Password ........................................................................................................ 50
Password Aging ..................................................................................................................... 50
Password Cracking Tools....................................................................................................... 51
Limitations of Password Authentication ................................................................................. 52
Non-Login Accounts................................................................................................................... 53
User Security with SU ................................................................................................................ 53
Role Based Access Control .......................................................................................................54
Creating A Profile ................................................................................................................... 55
Associating Executions with a Profile..................................................................................... 55
Creating a Role ...................................................................................................................... 55
Assigning a Role to a User..................................................................................................... 55
Logging in to a Role ............................................................................................................... 56
Listing Roles for a User .......................................................................................................... 56
Listing Profiles for a Role ....................................................................................................... 56
Permissions................................................................................................................................ 56
Directories and Files............................................................................................................... 56