System Administration Guide
Chapter 5, Maintaining system security

Administering a trusted system

Administering a trusted system

You have already chosen the security scheme (Low, Traditional, Improved, or High) to be used on your system. Even if you did not choose to run a trusted (Improved or High) system, you should consider the following options, which are useful under any set of defaults: