Section 20.191 Trusted Operating Systems Flashcards
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
Trusted Operating System (TOS)
An operating system that is designed to provide a secure computing environment by enforcing stringent security policies that usually rely on mandatory access controls
Used where Confidentiality, Integrity, and Availability is essential
Evaluation Assurance Level (EAL)
A predefined security standard and certification from the Common Criteria for Information Technology Security Evaluation
Common criteria standards are used to assess the effectiveness of the security controls in an operating system:
● EAL 1 is the lowest level of assurance
● EAL 7 is the highest level of assurance
Trusted operating systems often include
Mandatory Access Control
Access permissions are determined by a policy defined by the system administrators and enforced by the operating system
■ Security Auditing
■ Role-based Access Control
Trusted operating systems example
SELinux (Security-Enhanced Linux)
Set of controls that are installed on top of another Linux distribution like CentOS or Red Hat Linux
When using SELinux, these systems are rated as an EAL4+. SELinux is used as an implementation of MAC in the Linux kernel to ensure that applications and users only have the minimum necessary access
to your resources. SELinux uses policies to enforce security properties and can confine potentially harmful processes to limit the impact of the vulnerabilities.
Trusted Solaris
Offers secure, multi-level operations with MAC, detailed system audits, and data/process compartmentalisation
○ Trusted OS enhances security with microkernels by minimizing the trusted base and reducing attack surface and vulnerabilities
○ Choosing an operating system requires balancing security with usability, performance, and functional requirements