Comparing the multilevel security policies of the Solaris Trusted Extensions and Red Hat Enterprise Linux systems

Monday, 26 March 2007, 3:21 AM EST

Sun and Red Hat have both submitted new versions of their trusted OS for CC certification evaluation. While these systems are being evaluated against the same CC protection profiles and at the same evaluation assurance level, these systems differ in significant ways that affect how a customer might choose to use such systems.

The new Sun Solaris Trusted Extensions (Trusted Extensions) software implements its multilevel security (MLS) policy based on the Solaris Containers model, which uses labeled zones. Instead, Red Hat's approach is to create an MLS policy configuration that extends the type enforcement policy implemented in Security-Enhanced Linux (SELinux).

At Sun.

[ Read more ]




Spotlight

Black hole routing: Not a silver bullet for DDoS protection

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Mar 2nd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //