SlideShare a Scribd company logo
Securing Solaris Servers Randy Marchany
General Strategy Most Solaris security checklists recommend installing the minimum set of software needed to run the system. Most sysadmins don’t do this. General strategy Remove all privilege and access and grant or enable only what is needed. Enable as much system logging as possible!
Two Strategies Use the SANS Securing Solaris checklist Use the Center for Internet Security Securing Solaris Benchmark Use the CERT Securing Solaris Server checklist. Use the SANS or CIS checklists when the CERT checklist recommends it.
Solaris Installation Disconnect the system from the net? Optional Download patches, other software to another machine if possible. Obtain the following information IP name, IP address, subnet mask, default gateway, DNS server, Domain name, Time Zone
Solaris Installation Boot time configuration SANS Guide steps 1.1.1-1.1.8, Basic OS Installation Step 1.1.5, select ‘other’. Minimal OS installation (optional) SANS Guide steps 1.2.1-1.2.7, select “system accounting”.
Solaris Hardening Remove all packages not needed for the operation of the server. Verify /etc/hostname.<interface name> contains only the machine name. Verify /etc/inet/hosts (aka /etc/hosts) contains the following entries: 127.0.0.1 localhost <IP address> FQDN UQHN loghost <IP address> central syslog server (optional)
Solaris Hardening Verify /etc/nsswitch.conf contains the following entry: hosts:  files dns Verify /etc/netmasks contains: <network number> <subnet mask> SANS guide steps 1.3.1 – 1.35, Post Install/networking configuration Pick a secure password for the root account SANS guide steps 1.4.2-1.4.7, Installing Patches
Solaris Hardening Installing patches takes time, about 1 hour. It’s CRITICAL that you install the most current set of patches. Check security patches at least once a month. Use tools like patchdiag or GASP to make installation easier. Install Tripwire. Install SSH
Solaris Hardening  SANS Guide step 2.1.1, purging boot directories of Unnecessary Services SANS Guide step 2.1.2-2.1.5, 2.1.7, 2.1.8, 2.1.9, 2.1.10 Set umask to 027 Remove all services from /etc/inet.conf SANS Guide 2.2.1-2.2.5, Cleaning House
Solaris Hardening Install TCP Wrappers SANS Guide 2.3.1-2.3.3, file system configuration Set enhanced syslog logging Set debug level for kern, user, mail, daemon, auth, syslog, lpr, news, uucp, cron, local0-7 SANS Guide 2.4.3-2.4.4, Additional Logging
Solaris Hardening Sendmail Obtain updated  sendmail kit via anonymous ftp. One such site is: ftp.vt.edu/pub/cc/Solaris/sendmail*2.8* SANS guide 2.6.1-2.6.5 SANS guide 2.7.1-2.7.9, Miscellaneous

More Related Content

PDF
Nessus v6 command_line_reference
PPTX
Cisco umbrella youtube
PPTX
Pxosys Webinar Amplify your Security
PPTX
ASA Multiple Context Training
PPTX
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
DOCX
Snort Intrusion Detection / Prevention System on PFSense Firewall
PPTX
Network Security Nmap N Nessus
Nessus v6 command_line_reference
Cisco umbrella youtube
Pxosys Webinar Amplify your Security
ASA Multiple Context Training
Detect HTTP Brute Force attack using Snort IDS/IPS on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
Network Security Nmap N Nessus

What's hot (20)

PPTX
System hardening - OS and Application
PPTX
RuSIEM IT assets
PPTX
Cisco ASA Firepower
PPTX
Whats New in OSSIM v2.2?
PDF
Web server security techniques by Khawar Nehal
PPTX
Integrated Tools in OSSIM
PPTX
Cisco asa fire power services
PPTX
Server Hardening Primer - Eric Vanderburg - JURINNOV
PDF
VULNERABILITY ( CYBER SECURITY )
PPTX
OSSIM User Training: Get Improved Security Visibility with OSSIM
PPTX
WAF in Scale
ODP
opensuse conference 2015: security processes and technologies for Tumbleweed
PPT
Firewall intro
PPTX
Security Onion Conference - 2015
PPTX
Presentatie McAfee: Optimale Endpoint Protection 26062015
PPTX
CIS Control Solution Guide
PPT
Anton Chuvakin on Honeypots
PPTX
Mastering checkpoint-1-basic-installation
PPT
Linux Security
PDF
Firewallpresentation 100826052003-phpapp02
System hardening - OS and Application
RuSIEM IT assets
Cisco ASA Firepower
Whats New in OSSIM v2.2?
Web server security techniques by Khawar Nehal
Integrated Tools in OSSIM
Cisco asa fire power services
Server Hardening Primer - Eric Vanderburg - JURINNOV
VULNERABILITY ( CYBER SECURITY )
OSSIM User Training: Get Improved Security Visibility with OSSIM
WAF in Scale
opensuse conference 2015: security processes and technologies for Tumbleweed
Firewall intro
Security Onion Conference - 2015
Presentatie McAfee: Optimale Endpoint Protection 26062015
CIS Control Solution Guide
Anton Chuvakin on Honeypots
Mastering checkpoint-1-basic-installation
Linux Security
Firewallpresentation 100826052003-phpapp02
Ad

Viewers also liked (8)

PPT
Ch03 system administration
PPT
Beat Anger
PPT
Ch20 system administration
Ch03 system administration
Beat Anger
Ch20 system administration
Ad

Similar to Solaris servers sec (20)

PDF
Windows server hardening 1
PDF
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
PPT
Technology to Stop Hackers
PDF
Hardening solaris
PDF
Linux security quick reference guide
PPT
How to configure esx to pass an audit
PDF
Cisco Router and Switch Security Hardening Guide
PPTX
Server hardening
PDF
Red Hat Linux 5 Hardening Tips - National Security Agency
PPT
Introduction to JumpStart
DOC
Taishaun_OwnensCNS-533_Lab
PDF
Host Based Security Best Practices
PPT
Network administrationcode Lecture 1.ppt
PDF
Architecting Secure Web Systems
PDF
How to Use EXAchk Effectively to Manage Exadata Environments
PDF
Dru lavigne servers-tutorial
DOCX
Project Pt1
PPT
Freeware Security Tools You Need
PPT
Basics to Configure NW Device
PDF
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Windows server hardening 1
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
Technology to Stop Hackers
Hardening solaris
Linux security quick reference guide
How to configure esx to pass an audit
Cisco Router and Switch Security Hardening Guide
Server hardening
Red Hat Linux 5 Hardening Tips - National Security Agency
Introduction to JumpStart
Taishaun_OwnensCNS-533_Lab
Host Based Security Best Practices
Network administrationcode Lecture 1.ppt
Architecting Secure Web Systems
How to Use EXAchk Effectively to Manage Exadata Environments
Dru lavigne servers-tutorial
Project Pt1
Freeware Security Tools You Need
Basics to Configure NW Device
Null bhopal Sep 2016: What it Takes to Secure a Web Application

More from Raja Waseem Akhtar (20)

PPS
The prophet's wives
PPS
God is Great
PPS
Namaz ka tareeqa
PPS
Aayat ul qursi
PPT
Indiansoldiers
PPS
2ªwwii how did it fought
PPT
Fun with EMC2
PPS
Jerusalm at night.pps
PPS
From the sky
PPS
Discover the discovery
PPT
The OSI - seven layers
PPT
Chapter16 - the internet and its tools
PPT
Chapter15 -- implementing and managing networks
PPT
Chapter14 -- networking security
PPT
Chapter13 -- ensuring integrity and availability
PPT
Chapter12 -- troubleshooting networking problems
PPT
Chapter11 -- networking with tcpip and the internet
PPT
Chapter10 -- netware-based networking
PPT
Chapter09 -- networking with unix and linux
PPT
Chapter08 -- network operating systems and windows server 2003-based networking
The prophet's wives
God is Great
Namaz ka tareeqa
Aayat ul qursi
Indiansoldiers
2ªwwii how did it fought
Fun with EMC2
Jerusalm at night.pps
From the sky
Discover the discovery
The OSI - seven layers
Chapter16 - the internet and its tools
Chapter15 -- implementing and managing networks
Chapter14 -- networking security
Chapter13 -- ensuring integrity and availability
Chapter12 -- troubleshooting networking problems
Chapter11 -- networking with tcpip and the internet
Chapter10 -- netware-based networking
Chapter09 -- networking with unix and linux
Chapter08 -- network operating systems and windows server 2003-based networking

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Empathic Computing: Creating Shared Understanding
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
sap open course for s4hana steps from ECC to s4
Empathic Computing: Creating Shared Understanding
MYSQL Presentation for SQL database connectivity
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
MIND Revenue Release Quarter 2 2025 Press Release
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Solaris servers sec

  • 1. Securing Solaris Servers Randy Marchany
  • 2. General Strategy Most Solaris security checklists recommend installing the minimum set of software needed to run the system. Most sysadmins don’t do this. General strategy Remove all privilege and access and grant or enable only what is needed. Enable as much system logging as possible!
  • 3. Two Strategies Use the SANS Securing Solaris checklist Use the Center for Internet Security Securing Solaris Benchmark Use the CERT Securing Solaris Server checklist. Use the SANS or CIS checklists when the CERT checklist recommends it.
  • 4. Solaris Installation Disconnect the system from the net? Optional Download patches, other software to another machine if possible. Obtain the following information IP name, IP address, subnet mask, default gateway, DNS server, Domain name, Time Zone
  • 5. Solaris Installation Boot time configuration SANS Guide steps 1.1.1-1.1.8, Basic OS Installation Step 1.1.5, select ‘other’. Minimal OS installation (optional) SANS Guide steps 1.2.1-1.2.7, select “system accounting”.
  • 6. Solaris Hardening Remove all packages not needed for the operation of the server. Verify /etc/hostname.<interface name> contains only the machine name. Verify /etc/inet/hosts (aka /etc/hosts) contains the following entries: 127.0.0.1 localhost <IP address> FQDN UQHN loghost <IP address> central syslog server (optional)
  • 7. Solaris Hardening Verify /etc/nsswitch.conf contains the following entry: hosts: files dns Verify /etc/netmasks contains: <network number> <subnet mask> SANS guide steps 1.3.1 – 1.35, Post Install/networking configuration Pick a secure password for the root account SANS guide steps 1.4.2-1.4.7, Installing Patches
  • 8. Solaris Hardening Installing patches takes time, about 1 hour. It’s CRITICAL that you install the most current set of patches. Check security patches at least once a month. Use tools like patchdiag or GASP to make installation easier. Install Tripwire. Install SSH
  • 9. Solaris Hardening SANS Guide step 2.1.1, purging boot directories of Unnecessary Services SANS Guide step 2.1.2-2.1.5, 2.1.7, 2.1.8, 2.1.9, 2.1.10 Set umask to 027 Remove all services from /etc/inet.conf SANS Guide 2.2.1-2.2.5, Cleaning House
  • 10. Solaris Hardening Install TCP Wrappers SANS Guide 2.3.1-2.3.3, file system configuration Set enhanced syslog logging Set debug level for kern, user, mail, daemon, auth, syslog, lpr, news, uucp, cron, local0-7 SANS Guide 2.4.3-2.4.4, Additional Logging
  • 11. Solaris Hardening Sendmail Obtain updated sendmail kit via anonymous ftp. One such site is: ftp.vt.edu/pub/cc/Solaris/sendmail*2.8* SANS guide 2.6.1-2.6.5 SANS guide 2.7.1-2.7.9, Miscellaneous