Section 20.191 Trusted Operating Systems Flashcards

Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.

1
Q

Trusted Operating System (TOS)

A

An operating system that is designed to provide a secure computing environment by enforcing stringent security policies that usually rely on mandatory access controls

Used where Confidentiality, Integrity, and Availability is essential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Evaluation Assurance Level (EAL)

A

A predefined security standard and certification from the Common Criteria for Information Technology Security Evaluation

Common criteria standards are used to assess the effectiveness of the security controls in an operating system:

● EAL 1 is the lowest level of assurance
● EAL 7 is the highest level of assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trusted operating systems often include

Mandatory Access Control

A

Access permissions are determined by a policy defined by the system administrators and enforced by the operating system

■ Security Auditing
■ Role-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trusted operating systems example

SELinux (Security-Enhanced Linux)

A

Set of controls that are installed on top of another Linux distribution like CentOS or Red Hat Linux

When using SELinux, these systems are rated as an EAL4+. SELinux is used as an implementation of MAC in the Linux kernel to ensure that applications and users only have the minimum necessary access
to your resources. SELinux uses policies to enforce security properties and can confine potentially harmful processes to limit the impact of the vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trusted Solaris

A

Offers secure, multi-level operations with MAC, detailed system audits, and data/process compartmentalisation

○ Trusted OS enhances security with microkernels by minimizing the trusted base and reducing attack surface and vulnerabilities

○ Choosing an operating system requires balancing security with usability, performance, and functional requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly