Trusted Solaris
2.5.1


Supplier:

Sun Microsystems
Platforms:

Solaris
Description:

Trusted Solaris™ 2.5.1, a commercial off-the-shelf (COTS) product, is based on Solaris 2.5.1, Common Desktop Environment (CDE) 1.1, and Solstice™ AdminSuite™ 2.1. It controls who is granted access to information and what users are permitted to do on the system.

Trusted Solaris provides safeguards against internal and external threats, beyond the protections commonly available with standard UNIX ™ systems. The traditional power of the root user has been removed and roles have been added to allow for a more secure operating system.

Enterprises can fine-tune security protections to their own specific requirements. Multiple workstations and servers can be configured together in a distributed system whereby users can share files, send mail, remotely login and print--all at multiple levels.

Features:

  1. Builtin Mandatory Access Control and Discretionary Access Control (MAC and DAC).
  2. Enforcement of the security principle of "Least Privilege".
  3. Sensitivity and information labels are assigned to files, devices, windows, hosts, networks and other system objects.
  4. Modified Solstice™ User and Database Managers enforce the use of dual administrative roles.
  5. Trusted CDE environment with labeled windows and Trusted Screen Stripe.
  6. Trusted Networking support with each data packet labeled.
  7. Unique Execution Profiles allow grouping of applications and actions with optional security attributes.
  8. Printers can be configured to be a Restricted Label range.
  9. All removeable devices have to be allocated before use to stop data being removed without proper authorisation.
  10. Configurable roles and windowing options through the Label Encodings file.
Certification:

ITSEC: E3, F-B1 / F-C2
Price:

on application
URL:

www.sun.com/products-n-solutions/government/trustedsolaris.html

 

© Copyright Townsend & Taphouse, 1998-2002. All rights reserved.
Home   Products Section