Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity

    A Matter of Trust

    Written by

    Jim Rapoza
    Published February 23, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      For IT administrators, one of the toughest and most thankless jobs is securing a server that will run vital enterprise applications. No matter what operating system the server is running, effectively hardening the server requires long hours and painstaking effort.

      Even if you do the best job possible, however, it may be for naught if the enterprise applications running on the server arent secure. If these applications have bugs that make them susceptible to buffer overflows or scripting attacks, a hacker or worm will be able to bypass all of your hardening work to gain full access to the server system.

      For a few years, trusted operating systems have been the only practical defense against the vulnerabilities of bad applications. Simply put, a trusted operating system is based on the precept that no user or application has the right to do anything,including the root user. Essentially, a trusted OS trusts nothing.

      In a trusted OS, the system administrator must give specific rights to each user and application, neither of which can go beyond these rights. Even if a hacker breaks through an application, it does the hacker no good, because he or she cant do anything beyond what the application itself is allowed to do.

      The strength of a trusted operating system was proved a couple of years ago during eWEEKs OpenHack 3 tests, when we pitted thousands of security experts and hackers worldwide against servers protected by Argus Systems PitBull trusted OS for Linux.

      Facing the highest number of attacks of any of the four OpenHacks, the servers remained unscathed despite the fact that many attackers were able to compromise user accounts and even the root account.

      Generally, the only way to beat a trusted operating system is to crack the kernel of the OS itself, which is a very difficult task, though not an impossible one, as Argus found when PitBull was defeated in a subsequent (non-eWEEK) test.

      With these facts on the table, youre probably wondering why anyone would not use a trusted server operating system. Well, there are several hurdles to deploying a trusted OS. First, they are very complex to configure. Its a constant run of trial and error to configure the permissions so that your applications run properly. Second, making subsequent changes can be a nightmare, often requiring starting from scratch.

      These hurdles arent insurmountable and, given the benefits of a trusted OS, companies needing to protect vital enterprise applications and data will find deploying one well worth the effort. However, it would be great if the benefits of a trusted operating system were more easily available to all. A couple of recent announcements might help.

      First, Sun announced a set of new security features that will be included in Solaris 10 when it ships at the end of the year. Catching my eye in this list was the fact that Solaris 10 will include process rights management. This is a key feature of trusted OSes, such as Suns own military-grade Trusted Solaris, which makes it possible to limit the rights of every user and application.

      Suns announcement was followed by Red Hats statement that Red Hat Enterprise Linux 4.0, which comes out next year, will include support for SE Linux, a secure version of Linux developed by the National Security Agency. While not a pure trusted OS, SE Linux implements many trusted OS concepts.

      Of course, companies can already get Trusted Solaris, and experienced Linux administrators can already deploy SE Linux into their Red Hat systems. But these announcements should lower the bar to using these high-level security capabilities.

      Whats needed now is something that helps administrators properly deploy these security measures, perhaps taking them step by step through the process, or letting them choose default security templates as starting points. Even other operating systems such as Windows Server 2003, which has capabilities to lock down the rights of processes and accounts, could benefit from these kinds of user aids.

      The powerful security protections in trusted OSes and their kin are proven to protect vital systems—but only if administrators can deploy them.

      Labs Director Jim Rapozas e-mail address is jim_rapoza@ziffdavis.com.

      Jim Rapoza
      Jim Rapoza
      Jim Rapoza, Chief Technology Analyst, eWEEK.For nearly fifteen years, Jim Rapoza has evaluated products and technologies in almost every technology category for eWEEK. Mr Rapoza's current technology focus is on all categories of emerging information technology though he continues to focus on core technology areas that include: content management systems, portal applications, Web publishing tools and security. Mr. Rapoza has coordinated several evaluations at enterprise organizations, including USA Today and The Prudential, to measure the capability of products and services under real-world conditions and against real-world criteria. Jim Rapoza's award-winning weekly column, Tech Directions, delves into all areas of technologies and the challenges of managing and deploying technology today.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×