The management identifies an experienced administrator with the following qualifications:
Is assessed to be trustworthy
Knows how to administer Solaris systems
Understands the organization's information-processing goals well enough to be responsible for overseeing or implementing the site's security
That person is assigned the job of security administrator.
Long before installing Trusted Extensions software, the security administrator starts to learn about security and to prepare a plan for the site's security policy. First, the security administrator reads the following documents:
Implementing Site Security in Solaris Trusted Extensions Installation and Configuration – For guidance on creating a site's security policy
Solaris Trusted Extensions User’s Guide – To become familiar with label types and appearance
Solaris Trusted Extensions Administrator’s Procedures – To become familiar with security administrator responsibilities and tools
Chapter 1, Labels in Trusted Extensions Software – To review label concepts
Then, the security administrator starts with a plan for the site's labels. The planning process is described in the following sections.