- Enhancing Security
- Recommendations and Methodologies for Minimization
- Qualifying a Solaris Configuration
- Automating Domain Installations
- Using Scripts to Qualify a Solaris Configuration
- Minimization Methodology
- About the Authors
- Related Resources
- Ordering Sun Documents
- Accessing Sun Documentation Online
Securing computer systems against unauthorized access is one of the most pressing issues facing today's data center administrators. Recent studies suggest that the number of unauthorized access continues to rise, as do the monetary losses associated with these security breaches.
One way to reduce system vulnerabilities is to minimize the amount of software on a server. Fewer software components on a server means fewer security holes to detect and close. A vast number of system intrusions are accomplished through exploiting security holes in unnecessary operating system (OS) components. Minimizing the quantity of OS and other software components installed on a server can greatly improve overall system security by reducing the potential vulnerabilities.
This technique is referred to as minimization and is based on the premise that only software components for which there is a specific requirement or business need should be installed on a system.