SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

Size: px
Start display at page:

Download "SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?"

Transcription

1 SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise

2 Agenda Evaluation Validation Certification Details on Certifications and Validations Common Criteria Certification FIPS NIST SP A DISA STIG BSI IT Grundschutz Other Certifications and Validations SUSE Linux Enterprise 12 2

3 Evaluation Validation Certification

4 Evaluation Validation Certification Validation Compare behavior of the software / module against an existing standard or expected behaviour. Evaluation Examine claims made about a target. Claims do not need to be based on standards. Certification 4

5 Details on Certifications and Validations

6 Common Criteria How can I be sure to get the security I need? Common Accepted by 26 countries all over the world The certification is following a worldwide standard, thus e.g. certifications of certification body B (e.g. BSI) are accepted by certification body N (NIAP/NIST) Common Criteria Recognition Arrangement (CCRA) Evaluation Assurance Level 4+ Standardized set of test cases Tested at level 4, '+' is an augmentation (e.g. FLR = Flaw Remediation) The highest level for a commercial O/S 6

7 Common Criteria (2) Important abbreviations in this context Security Functional Requirement (SFR) Security Assurance Requirement (SAR) Protection Profile (PP) Security Target (ST) Target of Evaluation (TOE) More information 7

8 FIPS (US) Federal Information Processing Standard Usage: US FedGov, FISMA, Financial Industry Certificate is issued by NIST and CSEC FIPS ensures that Crypto algorithms/modes follow the corresponding standard No obvious crypto weakness exists No out dated algorithms are used Key length is sufficient Vital Definition of cryptographic module (CM), the functional description of the validation target Self test with each invocation of CM Integrity check Checks performed even if module is not in FIPS mode! Successor FIPS in preparation 8

9 NIST SP A Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Hashing No MD5, no SHA-1 hashing algorithms anymore Use SHA-224, SHA-256, SHA-384, SHA-512 See also: FIPS Secure Hash Standard (SHS) Other cryptography HMAC: key length >= 112bits Signing: DSA or RSA, key length >= 2048bits Symmetric encryption: 3DES, AES Public key encryption: RSA, key length >= 2048 bits See also: FIPS Digital Signature Standard (DSS) 9

10 DISA STIG Defense Information Systems Agency (DISA) defines Security Technical Implementation Guide (STIG) Configuration standard Hardening or Lockdown Purpose Secure Installation Secure Maintenance Builds upon other certifications and documentation (e.g. Hardening Guide) 10

11 BSI IT Grundschutz (ITGS, Germany) Certification of customers' environment and processes Covers more than the Operating System an Operating System cannot be ITGS certified Precondition Common Criteria (CC) Certification and CC documentation SUSE Linux Enterprise Security and Hardening Guide More information

12 PCI DSS (Payment Card Industry) Conformance Certification for a customers environment Covers more than the Operating System an Operating System cannot be PCI DSS certified SUSE Status: Does not require changes on SUSE Linux Enterprise Server itself Builds upon parameters and capabilities of SUSE Linux Enterprise Main source for the certification of customers' and partners' environments according to PCI DSS: SUSE Linux Enterprise Security and Hardening Guide 12

13 FSTEC (Russia) Achieved for SUSE Linux Enterprise Server 10, SUSE Linux Enterprise Server 10 SP3, SUSE Linux Enterprise Server 11 SP1 Might need refresh according to market needs More information: List of certified systems: 13

14 Dependencies of Certifications STIG DISA US-Mil PCI DSS Finance BSI IT Grundschutz DE-Gov FSTEC RUS-Gov FIPS (Crypto) ARCH¹ RNG² Common Criteria (Security) ¹ ARCH = Security Architecture Document ² RNG = Random Number Generator 14

15 SUSE Linux Enterprise 12

16 Common Criteria Certification Formal Details Certification Body: BSI Evaluation Lab: atsec information security Product (TOE, Target of Evaluation) SUSE Linux Enterprise Server 12 Protection Profile: OSPP-BSI at EAL4 with augmentation (Flaw Remediation). Sponsor: SUSE LLC Project Lead: Thomas Biege, CSSLP, Team Leader MaintenanceSecurity at SUSE 16

17 Common Criteria Certification (2) TOE Configuration Architectures x86-64 s390x other architectures might follow Virtualization (x86-64) KVM and Xen guest KVM host configuration Installation via AutoYaST 17

18 FIPS Architectures x86-64 other architectures might follow Modules 1. Kernel 2. libgcrypt 3. Disk encryption 4. OpenSSL 5. OpenSSH Client 6. OpenSSH Server 7. NSS 8. StrongSWAN (IPSec) 18

19 Dependencies of FIPS CSMs in SUSE Linux Enterprise 12 A depends on B openssh server openssh client strongswan IKE v1/v2 EDC FIPS Level 2 requires an OS with CC EAL2, at least CC EAL4+ libgcrypt openssl initialize IPSec NSS crypto algos PBKDF dm_crypt cryptsetup PBKDF kernel Crypto API initialize block ciphers 19

20 Your Questions!? Thank you. 20

21 Corporate Headquarters Maxfeldstrasse Nuremberg Germany (Worldwide) Join us on: 21

22 Unpublished Work of SUSE LLC. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary and trade secret information of SUSE LLC. Access to this work is restricted to SUSE employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of SUSE. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. SUSE makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for SUSE products remains at the sole discretion of SUSE. Further, SUSE reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All SUSE marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.

SUSE Linux Enterprise 12 Security Certifications

SUSE Linux Enterprise 12 Security Certifications SUSE Linux Enterprise 12 Security Certifications Common Criteria, FIPS, PCI DSS, DISA STIG,... What's All This About? Thomas Biege Team Lead Maintenance/Security [email protected] 2 Evaluation Validation

More information

Advanced Systems Management with Machinery

Advanced Systems Management with Machinery Advanced Systems Management with Machinery Andreas Jaeger Thomas Göttlicher Senior Product Manager [email protected] Software Engineer [email protected] Who Are We? Andreas Jaeger Product Manager Thomas

More information

Challenges Implementing a Generic Backup-Restore API for Linux

Challenges Implementing a Generic Backup-Restore API for Linux Challenges Implementing a Generic Backup-Restore API for Linux Matthias G. Eckermann Senior Product Manager [email protected] Vault, Boston, March 2015 2015-03-12 13:45 UTC Picture: "Escribano" by Jean Le Tavernier

More information

Implementing Linux Authentication and Authorisation Using SSSD

Implementing Linux Authentication and Authorisation Using SSSD Implementing Linux Authentication and Authorisation Using SSSD Lawrence Kearney Enterprise Service and Integration Specialist Technology Transfer Partnership (TTP) [email protected] Mark Robinson

More information

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256 Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256 Brad DesAulniers Senior Software Engineer [email protected] @cb_brad Ryan Hodgin Senior IT Architect [email protected]

More information

Configuration Management in SUSE Manager 3

Configuration Management in SUSE Manager 3 Configuration Management in SUSE Manager 3 TUT20515 Klaus Kämpf Product Owner, SUSE Manager [email protected] Agenda 2 SUSE Manager 3 themes About Configuration Management Choosing the right stack Getting

More information

We are watching SUSE

We are watching SUSE We are watching SUSE Monitoring at SUSE and in SUSE Linux Enterprise Server 12 Martin Čaj Linux System Administrator Prague Czech Republic [email protected] Joachim Werner Senior Product Manager Nürnberg Germany

More information

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad VP, Platform Evangelism WSO2 [email protected] Section Break Text Here (32pt) Cloudy Goals Improve efficiency and

More information

Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales

Using SUSE Linux Enterprise to Focus In on Retail Optical Sales Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales Patrick Mullin Scott Steele Senior Technical Specialist SUSE Consulting [email protected] Point of Sale Manager National Vision, Inc. [email protected]

More information

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12. <[email protected]>

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12. <jsmeix@suse.com> Relax-and-Recover on SUSE Linux Enterprise 12 Johannes Meixner Topics What is Relax-and-Recover? What means disaster recovery here? How does disaster recovery work? How does Relax-and-Recover

More information

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla Sales Engineer [email protected] Agenda Overview Manual Deployment Orchestration Generic workload autoscaling Sahara Dedicated for Hadoop

More information

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris SUSE FUT7537 Software Defined Introduction and Roadmap: Getting your tentacles around data growth Larry Morris Sr. Product Manager [email protected] AGENDA Enterprise Market SUSE Product SUSE Solutions

More information

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction Arun Singh Sr. Technical Manager [email protected] Agenda 2 Introduction SUSE Components Oracle

More information

How To Make A Cloud Work For You

How To Make A Cloud Work For You OpenStack Deep Dive Alan Clark OpenStack, Chairman of the Board Director, SUSE [email protected] Community Size Q2 2014 ECOSYSTEM SIZE (Members + Sponsors + Supporters) 390 Companies Members: 26 Sponsors:

More information

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project Ralf Bueker DSE Bundesagentur für Arbeit [email protected] What is a DSE? DSE means

More information

DevOps and SUSE From check-in to deployment

DevOps and SUSE From check-in to deployment DevOps and SUSE From check-in to deployment Rodolfo Bejarano SUSE Systems Engineer [email protected] Rick Ashford SUSE Systems Engineer [email protected] 2 Agenda 3 Introductions Development

More information

SUSE Linux uutuudet - kuulumiset SUSECon:sta

SUSE Linux uutuudet - kuulumiset SUSECon:sta SUSE Linux uutuudet - kuulumiset SUSECon:sta Olli Tuominen Technology Specialist [email protected] 2 SUSECon 13 4 days, 95 Sessions Keynotes, Breakout Sessions,Technology Showcase Case Studies, Technical

More information

Operating System Security Hardening for SAP HANA

Operating System Security Hardening for SAP HANA Operating System Security Hardening for SAP HANA Peter Schinagl Technical Architect Global SAP Alliance [email protected] Markus Gürtler Architect & Technical Manager SAP Linux Lab [email protected] Corporate

More information

Using btrfs Snapshots for Full System Rollback

Using btrfs Snapshots for Full System Rollback Using btrfs Snapshots for Full System Rollback Matthias G. Eckermann Senior Product Manager [email protected] Enterprise End User Summit, New York, June 2014 2014-06-20 15:44 UTC Why this? Minimizing Downtime

More information

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer cs@suse.

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer cs@suse. HO15982 Deploy OpenStack The SUSE OpenStack Cloud Experience Alejandro Bonilla Sales Engineer [email protected] Michael Echavarria Sales Engineer [email protected] Cameron Seader Sales Engineer [email protected]

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

SUSE Customer Center Roadmap

SUSE Customer Center Roadmap SUSE Customer Center Roadmap Simona Arsene Product Manager Services Artem Chernikov Engineer Cloud & System Management Agenda SCC Today Live Demo of SCC Registration Process New features 2 1 Nov 2012 Alpha

More information

kgraft Live patching of the Linux kernel

kgraft Live patching of the Linux kernel kgraft Live patching of the Linux kernel Vojtěch Pavlík Director SUSE Labs [email protected] Why live patching? Common tiers of change management: 1. Incident response (we're down, actively exploited )

More information

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen [email protected]

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen kim.aaltonen@suse.com Big Data, SAP HANA SUSE Linux Enterprise Server for SAP Applications Kim Aaltonen [email protected] 2 Agenda 3 Big Data SAP HANA Optimized Linux for SAP Why SUSE for SAP? Summary 4 5 Big Data What

More information

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications Uwe Heinz Product Manager SAP [email protected] Fabian Herschel Senior Architect SAP LinuxLab

More information

Software Defined Everything

Software Defined Everything Software Defined Everything, s, Containers, and Storage Pete Chadwick Senior Product Manager [email protected] Joachim Werner Senior Product Manager [email protected] Data Center History - 1970s One (big)

More information

Wicked Trip into Wicked Network Management

Wicked Trip into Wicked Network Management Wicked Trip into Wicked Network Management Matthias G. Eckermann Senior Product Manager [email protected] LinuxCon 2013 NA 2013-09-12 15:40 UTC Some Words of Encouragement There is a theory which states, that

More information

Oracle Products on SUSE Linux Enterprise Server 11

Oracle Products on SUSE Linux Enterprise Server 11 Oracle Products on SUSE Linux Enterprise Server 11 Technical Introduction Arun Singh Sr. Technical Manager [email protected] Agenda Introduction SUSE Products Oracle Products Road Map Question and Answer

More information

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW Andreas Pöschl, BMW Senior Solutions Architect [email protected] Michael Vonderbecke, BMW Solutions Architect [email protected]

More information

FIPS 140-2 Security Policy

FIPS 140-2 Security Policy Red Hat Enterprise Linux 6.2 dm-crypt Cryptographic Module v2.0 Version 1.4 Last Update: 2013-04-03 Contents 1 Cryptographic Module Specification...3 1.1 Description of Module...3 1.2 Description of Modes

More information

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management Stefan Stiehl Senior Technology Sales Specialist Identity Security Management [email protected]

More information

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open Simon Briggs Technology Specialist [email protected] Open Source = openmind 3 Protect Investment & Work Together 4 Cloud Definitions

More information

Wicked A Network Manager Olaf Kirch

Wicked A Network Manager Olaf Kirch Wicked A Network Manager Olaf Kirch Director SUSE Linux Enterprise [email protected] 2 Agenda Why Wicked!? What we want to achieve What Wicked can do today/tomorrow Architecture Wicked little intro Why Wicked!?

More information

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect [email protected]

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect rjschwei@suse.com Public Cloud Build, Use, Manage Robert Schweikert Public Cloud Architect [email protected] Public Cloud Build, Use, Manage Introduction About me Disclaimers Build vs. Ready made What do I... Now what?

More information

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server Marcus Meissner Software Engineer SUSE Craig Gardner Software Engineer SUSE Roman Drahtmueller Software Engineer SUSE

More information

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP

More information

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales Engineer @SUSE [email protected]

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack Gábor Nyers Sales Engineer @SUSE [email protected] Introductory video ChalkTalk: SUSE OpenStack Cloud 2 Stetting the Stage for SUSE OpenStack

More information

Certification Report

Certification Report Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria

More information

SUSE Cloud 5 Private Cloud based on OpenStack

SUSE Cloud 5 Private Cloud based on OpenStack SUSE Cloud 5 Private Cloud based on OpenStack Michał Jura Senior Software Engineer Linux HA/Cloud Developer [email protected] 2 New solutions emerge: Infrastructure-as-Service Cloud = 3 SUSE Cloud Why OpenStack?

More information

How SUSE Is Helping You Rock The Public Cloud

How SUSE Is Helping You Rock The Public Cloud How SUSE Is Helping You Rock The Public Cloud James Mason Robert Schweikert Technical Architect, Public Cloud [email protected] Public Cloud Architect [email protected] Topics 2 A very quick and brief Public

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Certification Report

Certification Report Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification

More information

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0 FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282

More information

Deploying Hadoop with Manager

Deploying Hadoop with Manager Deploying Hadoop with Manager SUSE Big Data Made Easier Peter Linnell / Sales Engineer [email protected] Alejandro Bonilla / Sales Engineer [email protected] 2 Hadoop Core Components 3 Typical Hadoop Distribution

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer [email protected]

HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer abonilla@suse.com HO5604 Deploying MongoDB A Scalable, Distributed Database with SUSE Cloud Alejandro Bonilla Sales Engineer [email protected] Agenda SUSE Cloud Overview What is MongoDB? 2 Getting familiar with the Cloud

More information

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales Engineer @SUSE [email protected]

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com SUSE Enterprise Storage Highly Scalable Software Defined Storage Gábor Nyers Sales Engineer @SUSE [email protected] Setting the Stage Enterprise Data Capacity Utilization 1-3% 15-20% 20-25% Tier 0 Ultra

More information

Linux w chmurze publicznej SUSE na platformie Microsoft Azure

Linux w chmurze publicznej SUSE na platformie Microsoft Azure Linux w chmurze publicznej SUSE na platformie Microsoft Azure Grzegorz Piotrowski Solution Architect C2O C EH, ISO27001-2, ITIL SM, PMI P2, MCT CCEE Virtualization MCSE Private Cloud VCA Cloud [email protected]

More information

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager About our Cryptographic and Security Testing Laboratory Bringing together a suite of conformance testing

More information

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center [email protected]

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center dshankar@us.ibm.com Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center [email protected] Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing

More information

Btrfs and Rollback How It Works and How to Avoid Pitfalls

Btrfs and Rollback How It Works and How to Avoid Pitfalls Btrfs and Rollback How It Works and How to Avoid Pitfalls Thorsten Kukuk Senior Architect SUSE Linux Enterprise Server [email protected] rm -rf /? I will be discussing what is needed for rollback: Btrfs /

More information

High Availability Storage

High Availability Storage High Availability Storage High Availability Extensions Goldwyn Rodrigues High Availability Storage Engineer SUSE High Availability Extensions Highly available services for mission critical systems Integrated

More information

How To Evaluate Watchguard And Fireware V11.5.1

How To Evaluate Watchguard And Fireware V11.5.1 Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server 12

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server 12 Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server 12 Craig Gardner Software Engineer SUSE [email protected] Overview What? and Why? New for SUSE Linux Enterprise

More information

Of Pets and Cattle and Hearts

Of Pets and Cattle and Hearts Of Pets and Cattle and Hearts The SUSE Systems Management Story Joachim Werner Senior Product Manager, SUSE [email protected] Who am I? 2 SUSE and Linux Workloads in the Enterprise SUSE Studio Datacenter Private

More information

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc. Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of Desktop: Enterprise Whole Disk Encryption Only Edition, Version 9.10.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria

More information

Introducing Director 11

Introducing Director 11 Introducing Director 11 Agenda Director 11 Introduction Mobile Certificate Manager - CA Import - Mobile Device Management (MDM) Integration - New Certificate Types - User Certificate Mapping - Single-

More information

TUT8155 Best Practices: Linux High Availability with VMware Virtual Machines

TUT8155 Best Practices: Linux High Availability with VMware Virtual Machines TUT8155 Best Practices: Linux High Availability with VMware Virtual Machines Jeff Lindholm SUSE Sr. Systems Engineer [email protected] Agenda SUSE Linux Enterprise High Availability Extension 12 Level

More information

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer IPSWITCH FILE TRANSFER WHITE PAPER U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer www.ipswitchft.com FIPS 140-2 is a standard first published in 2001 by the U.S. National

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Authentication requirement Authentication function MAC Hash function Security of

Authentication requirement Authentication function MAC Hash function Security of UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy

More information

Certification Report

Certification Report Certification Report HP Universal CMDB and Universal Discovery v10.21 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows Gábor Nyers Systems Engineer @SUSE [email protected] Agenda 14:00 Kangaroot Update SUSE Update Data Center Interoperability the

More information

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared

More information

NIST ITL July 2012 CA Compromise

NIST ITL July 2012 CA Compromise NIST ITL July 2012 CA Compromise Prepared for: Intelligent People [email protected] 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These

More information

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods

More information

Using BroadSAFE TM Technology 07/18/05

Using BroadSAFE TM Technology 07/18/05 Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security

More information

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School Don Vosburg Systems Engineer [email protected] [email protected] Who is

More information

Pulse Secure, LLC. January 9, 2015

Pulse Secure, LLC. January 9, 2015 Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May

More information

SkyRecon Cryptographic Module (SCM)

SkyRecon Cryptographic Module (SCM) SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.

More information

An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

More information

McAfee Firewall Enterprise 8.2.1

McAfee Firewall Enterprise 8.2.1 Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall

More information

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs [email protected]

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs lmb@suse.de Open Source High Availability Writing Resource Agents for your own services Lars Marowsky-Brée Team Lead SUSE Labs [email protected] Agenda Introduction Resource Agents in context Basic Resource Agents (+ code)

More information

Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services

Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services Max Walker Manager, Novell Services [email protected] 30 May 2008 Agenda SCP at Novell Services Global Documentation

More information

FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent

FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent LogRhythm, Inc. 4780 Pearl East Circle Boulder, CO 80301 May 1, 2015 Document Version 2.0 Module Versions 6.0.4 or 6.3.4

More information

Novell Collaboration Vibe OnPrem

Novell Collaboration Vibe OnPrem Novell Collaboration Vibe OnPrem Evergreen Preview Corne Groesbeek Open Horizons Tracy Smith Product Manager [email protected] Collaboration Solutions Collaboration solutions from Novell help enterprise

More information

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP) Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

More information

KVM, OpenStack and the Open Cloud SUSECon November 2015

KVM, OpenStack and the Open Cloud SUSECon November 2015 KVM, OpenStack and the Open Cloud SUSECon November 2015 Adam Jollans Program Director, Linux & Open Virtualization Strategy IBM Agenda A Brief History of Virtualization KVM Architecture OpenStack Architecture

More information

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128 SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication

More information

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher

More information

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage

More information

FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager

FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright

More information

Certification Report

Certification Report Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider

efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider January 2015 Introduction Competition is fierce in the exploding online backup industry. With so many

More information

McAfee Firewall Enterprise 8.3.1

McAfee Firewall Enterprise 8.3.1 Configuration Guide Revision A McAfee Firewall Enterprise 8.3.1 FIPS 140-2 The McAfee Firewall Enterprise FIPS 140-2 Configuration Guide, version 8.3.1, provides instructions for setting up McAfee Firewall

More information

SUSE Virtualization Technologies Roadmap

SUSE Virtualization Technologies Roadmap SUSE Virtualization Technologies Roadmap Michal Svec Mike Latimer Senior Product Manager [email protected] Senior Engineering Manager [email protected] Agenda Virtualization @SUSE Enhancements in XEN/KVM

More information

Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0

Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0 Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.0 Prepared for: Prepared

More information