This is a posting in the
Security Community 'Reference' Category ; the function of postings that are placed in this category is to aggregate links to other, useful postings in a single
meta-posting which can be referenced via a link in the Security Community Blog sidebar, and which will be re-posted on the blog each time it is refreshed by a member of the security community.
This posting is a list of Sun Security Blueprints.
As-per the description at the BluePrints Home Page
Sun BluePrints OnLine articles are maintained in this archive for the benefit and historical reference of our readers. Details of the recommendations set forth in these articles may not reflect Sun's latest hardware and software releases. Caution, careful analysis and common sense should be exercised when applying these Sun BluePrints articles to newer products and software releases.
Nonetheless, the provision of the entire, historical archive of BluePrints makes a useful corpus of security reference material, certain themes of IT security being invariant through time.
See the security blueprint full listing for the master copy of this list, with article synopses.
2008
2007
2006
2005
2004
2003
- Securing Linux Systems With Host-Based Firewalls: Implemented With Linux iptables (November 2003)
-by Ge' Weijers - Responding to a Customer's Security Incidents--Part 4: Processing Incident Data (October 2003)
-by Vijay Masurkar - Responding to Customer's Security Incidents--Part 3: Following Up After an Incident (September 2003)
-by Vijay Masurkar - Deploying the Solaris Operating Environment Using a Solaris Security Toolkit CD (September 2003)
-by Steven Spadaccini - Part I: Minimizing Domains for Sun Fire V1280, 6800, 12K, and 15K Systems (September 2003)
-by Nicholas O'Donnell and Alex Noordergraaf - Part II: Minimizing Domains for Sun Fire V1280, 6800, 12K, and 15K Systems (September 2003)
-by Nicholas O'Donnell and Alex Noordergraaf - Building Secure Sun Fire Link Interconnect Networks Using Sun Fire 15K and Sun Fire 12K Servers (August 2003)
-by Joe Higgins and Steven Spadaccini - Securing Sun Linux Systems: Part I, Local Access and File Systems (July 2003)
-by Glenn Brunette, Michael Hullhorst, and Ge Weijers - Securing Sun Linux Systems: Part II, Network Security (July 2003)
-Glenn Brunette, Michael Hullhorst, and Ge Weijers - Role Based Access Control and Secure Shell--A Closer Look At Two Solaris Operating Environment Security Features (June 2003)
-by Thomas M. Chalfant - Solaris Operating Environment Network Settings for Security: Updated for Solaris 9 Operating Environment (June 2003)
-by Alex Noordergraaf - Integrating the Secure Shell Software (May 2003)
-by Jason Reid - Auditing System Security (May 2003)
-by Alex Noodergraaf and Glenn Brunette - Responding to Customer's Security Incidents--Part 2: Executing a Policy (April 2003)
-by Vijay Masurkar - Configuring the Secure Shell Software (April 2003)
-by Jason M. Reid - Responding to Customer's Security Incidents--Part 1: Establishing Teams and a Policy (March 2003)
-by Vijay Masurkar - Securing the Sun Fire 12K and 15K System Controllers (February 2003)
-by Alex Noordergraaf and Dina Nimeh - Securing the Sun Fire 12K and 15K Domains (February 2003)
-by Alex Noordergraaf and Dina Nimeh - Securing the Sun Cluster 3.x Software (February 2003)
-by Alex Noordergraaf - Building Secure Sun Fire Link Interconnect Networks Using Midframe Servers (February 2003)
-by Joe Higgins - Building OpenSSH--Tools and Tradeoffs (January 2003)
-by Jason M. Reid - System Management Services Software: An Inside Look (January 2003)
-by Tom Chalfant
2002
2001
2000
1999