Red Hat. www.redhat.com. By Karl Wirth



Similar documents
Red Hat open source. 2 Why Red Hat for healthcare IT needs? 5 Cost.

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center

How To Achieve Pca Compliance With Redhat Enterprise Linux

Security Vulnerability Management. Mark J Cox

FOR SERVERS 2.2: FEATURE matrix

Why should I care about PDF application security?

REDUCE RISK WITH ORACLE SOLARIS 11

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

identity management in Linux and UNIX environments

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

A Complete Desktop-to-Server Solution for Your Small Business

Payment Card Industry (PCI) Terminal Software Security. Best Practices

Red Hat Enterprise Linux 6 Server:

From Private to Hybrid Clouds through Consistency and Portability

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

Security Enhanced Linux and the Path Forward

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Red Hat enterprise virtualization 3.0 feature comparison

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

BEST PRACTICES. Systems Management.

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

How To Get The Most Out Of Redhat.Com

Storage Management for the Oracle Database on Red Hat Enterprise Linux 6: Using ASM With or Without ASMLib

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Red Hat Enterprise Linux: The ideal platform for running your Oracle database

Secure computing: SELinux

SAS 70 Type II Audits

How To Migrate To Redhat Enterprise Linux 4

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Trend Micro. Advanced Security Built for the Cloud

Achieving PCI Compliance: How Red Hat Can Help. Akash Chandrashekar, RHCE. Red Hat Daniel Kinon, RHCE. Choice Hotels Intl.

Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization

Preliminary Course Syllabus

<Insert Picture Here> Oracle Premier Support Il Supporto di Oracle sulla Tecnologia e sulle Applicazioni

Introduction. PCI DSS Overview

Deep Security Vulnerability Protection Summary

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SUSE Linux Enterprise Desktop 11

Organizations that are standardizing today are enjoying lower management costs, better uptime. INTRODUCTION

PCI DSS Reporting WHITEPAPER

Certification Report

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

RED HAT ENTERPRISE VIRTUALIZATION

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

GFI White Paper PCI-DSS compliance and GFI Software products

Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment

Endpoint protection for physical and virtual desktops

Chapter 15 Operating System Security

Red Hat CloudForms: Open Clouds Under

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com

The red hat enterprise linux developer program

HOW RED HAT BRINGS OPENSTACK INTO THE ENTERPRISE by Bryan Che and Gordon Haff

Delivers high performance, reliability, and security. Is certified by the leading hardware and software vendors

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Designing Security for Microsoft SQL Server 2005

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Network Access Control ProCurve and Microsoft NAP Integration

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Ensuring the security of your mobile business intelligence

AN OVERVIEW OF VULNERABILITY SCANNERS

Secure Data Exchange Solution

JBoss Enterprise MIDDLEWARE

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Securing Data in a RHEL SELinux Multi-Level Secure Environment

The Benefits of Verio Virtual Private Servers (VPS) Verio Virtual Private Server (VPS) CONTENTS

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data

Achieving HIPAA Compliance with Red Hat

90% of data breaches are caused by software vulnerabilities.

INFOBrief. Red Hat Enterprise Linux 4. Key Points

Choosing an SSO Solution Ten Smart Questions

Achieving HIPAA Compliance with Red Hat

owncloud Architecture Overview

Red Hat Enterprise ipa

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

How To Use The Theos Platform

Session ID: Session Classification:

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

PortWise Access Management Suite

Did you know your security solution can help with PCI compliance too?

How To Manage A System Vulnerability Management Program

Securing the Service Desk in the Cloud

Making software from the open source community ready for the enterprise

FISMA / NIST REVISION 3 COMPLIANCE

Virtualization System Security

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

Red Hat Enterprise Linux 6. Stanislav Polášek ELOS Technologies

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Certification Report

IBM Security Intrusion Prevention Solutions

The perfect storm Why now is the time for open source

Classification of Security Issues

UNCLASSIFIED Version 1.0 May 2012

Transcription:

Red Hat Enterprise Linux 5 Security By Karl Wirth Abstract Red Hat Enterprise Linux has been designed by, and for, the most security-conscious organizations in the world. Accordingly, security has always been a central focus of the Red Hat Enterprise Linux family. This paper will show how Red Hat has led the way in developing new security technology making a secure operating system architecture an affordable, mainstream solution. We will discuss how the strength of open source development lowers the cost of security maintenance and how Red Hat continually looks for potential security exposures and delivers tested security updates through Red Hat Network. We will discuss how the company works closely with partners to make sure customers have a choice in building a secure, integrated environment. And finally, we will show how Red Hat has combined these strengths to produce a platform that offers customers world-leading security: Red Hat Enterprise Linux 5. www.redhat.com

Innovation, part 1: Red Hat Enterprise Linux 5 Security is not just about technology, but technology is important. The following major technical innovations are built into Red Hat Enterprise Linux 5, delivering real security benefits to customers: NEW FEATURE FUNCTION BENEFIT Common Criteria EAL 4+ Certification Virtualization Expanded SELinux coverage and usability Native smart card integration Additional attack protection Enhanced Auditing First OS to ship with native support for functionality necessary to meet Common Criteria for Trusted Operating Systems: EAL 4 CAPP, RBAC, and LSPP. OS level compartmentalization and rapid guest system deployment. 200+ core system services protected by default via targeted policies. SELinux management tools. Leverage smart cards for certificate based login (including kerberos ticket acquisition). Fortify Source on all packages, Stack smashing protection, Pointer encryption, SELinux memory protection. Complete, configurable local audit subsystem. Provides assurance that platform is designed, reviewed, and tested to the government s most rigorous security standards. Enables: (i) Application isolation by deploying each on a separate OS, (ii) Rapid deployment of honeypots, (iii) Rapid redeployment of compromised systems. Simplifies process of creating, customizing, managing, and troubleshooting SELinux policy. Increased authentication security. Additional buffer overflow and memory attack protection. Gives ability to centrally track (on a local system) events from logins to low level system events. Common Criteria EAL4+ certification Enterprise Linux 5 is the first operating system to ship with native support for the functionality necessary to meet Common Criteria for Trusted Operating Systems. This includes all functionality to enable EAL 4+ certification under the following protection profiles: CAPP (Controlled Access Protection Profile), RBAC (Role Based Access Control), and LSPP (Labeled Security Protection Profile). For customers outside of the government, this provides assurance that the platform is designed, reviewed, and tested to the government s most rigorous security standards. For government customers required to run Common Criteria for Trusted Operating Systems, Enterprise Linux 5 provides an open source solution that natively supports multi-level security. This is an exciting mainstream option for customers previously forced to depend on high priced, proprietary solutions. www.redhat.com

Virtualization Enterprise Linux 5 ships with built-in support for virtualization. Virtualization enables organizations to run multiple applications on one box in such a way that each application has its own OS. This has the benefit of isolating the applications from one another blocking one problem application from reaching or crashing other applications on the system. Virtualization also allows IT organizations to much more rapidly add and remove systems to their network. The rapid deployment of honeypots, as well as the rapid redeployment of systems which have become compromised are two examples of the security-enhancing roles that virtualization can play. Expanded SELinux coverage and usability SELinux (Security Enhanced Linux) enables granular policy-based control over programs access to data and kernel resources, preventing a compromised program from acting outside its policy. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest levels of security for the Linux operating system. By default, over 200 core system services in Enterprise Linux 5 are protected by targeted policies. This enables organizations to quickly benefit from the security provided by SELinux. Enterprise Linux 5 also includes enhanced SELinux management tools that simplify the process of creating, customizing, managing, and troubleshooting SELinux policy. Native smart card integration Customers can increase the level of security used for authentication with Enterprise Linux 5 systems from a one-factor password-based authentication scheme, to two-factor smart cardbased authentication. When enabled, the end user inserts their smart card into a smart card reader attached to the system. The end user then authenticates with their PIN and smartcard to gain access. Once the user authenticates via the Pluggable Authentication Module (PAM), the system can leverage this smart card authentication to generate a Kerberos ticket for the user that enables single-sign on to kerberos-aware applications like SSH, SCP, and Fedora Directory server. Firefox and Thunderbird can use the end-user s certificate to perform SSL client authentication to a web server that supports this. And Red Hat Certificate System can be used to create and manage the end user s certificate. www.redhat.com

Additional attack protection Enterprise Linux 5 includes four major innovations that protect systems against attack, particularly in the area of buffer overflow and other memory-based attacks. These new features are: Fortify Source. This check is now run on all selected packages. When the compiler knows the size of a buffer, it is possible to ensure the buffer will not overflow. Stack Smashing protection (canary values). The system will place a canary value at a randomized point above the stack. This canary value is verified during normal operation. If the stack has been smashed, the canary value will have been overwritten, indicating that the stack has indeed been smashed. This method can detect buffer overflows early. Pointer encryption. Function pointers are encrypted with unique random values. This is intended to detect an overwrite of a pointer in memory, and prevent the subsequent redirect of execution. SELinux memory protection. This enhancement can prevent any memory that was writable from becoming executable. This prevents an attacker from writing his code into memory and then executing it. Enhanced auditing A complete, configurable local audit subsystem is included with Enterprise Linux 5, giving organizations the ability to centrally track (on a local system) events from logins to low-level system events. It includes the ability to audit users, processes, and files as well as search and reporting utilities that quickly see when security events occur. Sample CAPP/LSPP rule sets are included. www.redhat.com 4

Innovation, part II: A history of innovation Red Hat leads the way in developing new security technology for Linux. Secure operating system architectures are now an affordable, mainstream option. The following chart illustrates some of the technologies included with Enterprise Linux, and the date of their introduction. SECURIT FEATURES RED HAT ENTERPRISE LINUX v.3 v.4 v.5 DESCRIPTION BENEFIT 2003 OCT 2005 FEB 2007 MAR Make data memory non-executable and program memory non-writable Put program code at a different address each time it starts. Enable randomization of load address of executables Prevent certain types of buffer overflow exploits from working as expected All parts of process (heap, stack, data, DSOs) are laid out randomly in the address space Attackers cannot predict where the application will start, making it very hard to exploit. since 2004Sep since 2004Sep since 2004Sep Cryptographic signing of update RPMs Prevent installation of fake updates Cryptographic signing of kernel modules Detect/prevent installation of fake kernel modules Special case of ASLR for the vdso Same as ASLR but specific to vdso no vdso Restrict how the kernel memory can be overwritten. Prevents several rootkits from functioning Granular policy-based control over program s access to data and the kernel Prevents compromised program from acting outside its policy Default enable system with targeted MAC policy -Role Based Access Control and TE Prevents compromised program from acting outside its policy By default, check heap memory for corruption and incorrect links When the compiler knows the size of a buffer, functions operate on the buffer to make sure it will not overflow Detect heap corruption early Prevents buffer overflows Prevents buffer overflows Automatically reorganize location of ELF data to be before program data Prevent.bss and.data overflows from affecting other program data Verification of randomized canary value indicates if stack has been smashed Detects buffer overflows early Encrypt function pointers with unique random values Detect overwrite of pointer in memory and subsequent redirect of execution Prevent any memory that was writable from becoming executable. Prevent attacker writing his code into memory and then executing it Enable multi layer security polices in SELinux Implement need to know policy Each of the above listed features is included in Red Hat Enterprise Linux, and contributes to its security. An equally important component of the Red Hat Enterprise Linux security story is that its security mechanisms are open source. www.redhat.com 5

Transparency The innovations in Enterprise Linux 5 are due in no small part to the power of the open source development model, which combines the input of customers, partners, developers, end-users, and administrators. Features which drive security further into the environment can more quickly and accurately be addressed and developed by harnessing the collective interests of the community. The availability of the source code for Enterprise Linux makes it a better alternative for creating secure systems than proprietary code. This kind of transparency has many benefits, including: Increased scrutiny. With many people looking at the code, vulnerabilities can be spotted before they can be used by viruses or worms. Not only are Red Hat engineers constantly working to find potential security issues in the software, but thousands of developers around the world are doing so as well, while looking for ways to improve security even more. Flexibility. Not only does open source development help fix flaws, but the flexibility of open source allows customers to match security technology to their processes. Security mechanisms are available for everyone to see and understand, allowing customers and partners to extend or enhance security functions to meet their needs. Modularity. The modular package-based design of Linux makes it easy to identify, resolve, and trace dependencies surrounding security issues compare this to the monolithic designs of other operating systems, where a single problem can have far-reaching and difficult-toidentify consequences. Studies, including a recent survey by Evans Data, show that Linux systems have fewer viruses and security breaches than competing operating systems. This higher level of security translates into direct value for customers: Less employee downtime from computer viruses and worms Secure web sites that are resistant to attacks IT budgets can be spent enabling productivity and infrastructure, not defending it Red Hat also adheres to and promotes several standards meant to increase transparency and tracking of vulnerabilities, including: CVE Compatibility. Red Hat adheres to the Common Vulnerabilities and Exposures standard, which allows customers to trace a vulnerability through multiple vendors with consistent naming. OVAL Compatibility. Red Hat helped create--and supports--the Open Vulnerability and Assessment Language patch definitions, providing a machine-readable version of our security advisories. www.redhat.com

Vigilance Red Hat continually looks for potential security exposures, certifies each package, delivers tested security updates through Red Hat Network, and supports our customers through Red Hat services and support. Security Response Team Red Hat s Security Response Team provides customers with a single point of contact for expert, integrated responses to emerging security threats. The team constantly tracks and investigates security issues affecting Red Hat customers, providing timely and clearly explained patches designed to help customers evaluate and manage their risk. By leveraging strong relationships with hardware and software vendors, Red Hat optimizes fixes for compatibility and performance across applications and configurations. Backporting of critical security fixes provides organizations with a predictable and stable means of maintaining secure systems on earlier releases of Enterprise Linux--without unnecessary or unplanned upgrades. To aid in maintaining a secure environment, Red Hat provides a variety of resources, including configuration guides and technology whitepapers. Red Hat security experts and security training are also available. Update management Customers can easily take advantage of the work of the Security Response Team through Red Hat Network. Red Hat Network provides functionality to reduce exposure to exploits, including: Tested fixes that are authorized and digitally signed by Red Hat. Email notification or automatic updating when fixes are available. Customized notifications that address a customer s specific environment. Management features that allow customers to easily manage and deploy updates across an entire enterprise. The capability to apply updates selectively to different computing groups within an environment. The functionality to facilitate internal testing before an update is deployed in an organization. Security updates that are checked for over one million dependencies, maintaining the integrity of the customer s systems. Support Red Hat Enterprise Linux allows customers to take advantage of the performance and security of Linux, while receiving the support they need to run their enterprise. Red Hat offers a single point of accountability for the hundreds of open source projects and applications that make up the Enterprise Linux offering. Red Hat s support staff all of whom are Red Hat Certified Engineers are dedicated to helping customers address any issues that arise. Certification In order to make sure that Enterprise Linux just works, Red Hat takes extensive measures to ensure the integrity of the products and services they offer. Red Hat developers inspect and test packages to ensure they work as intended, and examine the code for backdoors that could jeopardize the integrity of a customer s network. Then, the software is run through a rigorous quality assurance process. www.redhat.com 7

Inclusiveness Red Hat works closely with partners to make sure customers have choices when building a secure, integrated environment. The Open Source Architecture is Red Hat s vision of a standards-based system that allows customers the freedom to choose the components that work best for them. Security is a key part of the Open Source Architecture, enabling integrity across system components. Red Hat partners provide solutions that complement a secure environment, such as access management, anti-virus, and encryption solutions. Red Hat s close relationship with its partners and Red Hat s solid reputation in the platform community combine to improve the performance and functionality of products delivered by both Red Hat and its partners. In addition to low vulnerability rates, Red Hat Enterprise Linux has a partner support model that has been built on a collaborative and inclusive philosophy. All community members, customers, hardware, and software partners are part of an ecosystem that identifies security issues--often before they become exploit targets. Red Hat has partnered with IBM and HP for accreditations such as the Common Criteria EAL4+ CAPP profile Security Evaluation, which certifies that Red Hat Enterprise Linux meets stringent product and process standards for security. These certifications assure government customers that Enterprise Linux meets their requirements for highly secure environments. Summary Platform security must be a pervasive and fundamental part of the platform not just an add-on. It must be continually reviewed and maintained to ensure platform integrity, and organically include the partner ecosystem and the larger platform community. For these reasons, Red Hat Enterprise Linux 5 stands out as a state-of-the-art, industry-leading choice for settings where security really matters. At Red Hat, the values of innovation, transparency, vigilance and inclusiveness are not mere words, but business processes that combine to produce and maintain the most secure product possible, while also delivering the best value to customers. That s why Red Hat has consistently appeared at or near the top of the CIO Insight Survey for three years in a row. To learn more about how Red Hat Enterprise Linux 5 can help you protect your data assets, contact a Red Hat sales representative, or email us at sales@redhat.com. 2007 Red Hat, Inc. All Rights Reserved. Red Hat, Red Hat Enterprise Linux, the Shadowman logo and JBoss are registered trademarks of Red Hat, Inc. in the U.S. and other countries. Linux is a registered trademark of Linus Torvalds. All other trademarks are the property of their respective owners. www.redhat.com RT#342753_3/07