This chapter describes configurable security features on a system that is configured with Solaris Trusted Extensions.
Configurable Solaris Security Features
Security Requirements Enforcement
Rules When Changing the Level of Security for Data
Customization of Solaris Trusted Extensions (CDE)