{"id":175,"date":"2006-09-22T23:00:00","date_gmt":"2006-09-23T07:00:00","guid":{"rendered":"http:\/\/www.nomadicminds.org\/blogs\/2006\/09\/22\/suns-best-kept-secret-is-out\/"},"modified":"2006-09-22T23:00:00","modified_gmt":"2006-09-23T07:00:00","slug":"suns-best-kept-secret-is-out","status":"publish","type":"post","link":"http:\/\/www.nomadicminds.org\/blogs\/2006\/09\/suns-best-kept-secret-is-out\/","title":{"rendered":"Sun&apos;s Best Kept Secret (is out)"},"content":{"rendered":"<p>\nThroughout my tenure at the security post, I never quite figured out why is Trusted Solaris so esoteric.<br \/>\nThis lesser known operating system can give your enterprise a competitive edge and it is absolutely available to everyone in the world.  And, as part of Solaris, it is free too.<\/p>\n<p>\nIt will protect your business.  It is compatible to Solaris and run as fast.  It is decades ahead of Windows or Linux in terms of security.  Joanne Masters once said, &#8220;if you are getting a dog to protect your home, would you buy a Doberman or a Chihuahua?&#8221;<\/p>\n<hr width=\"25%\" color=\"00ffff\">\n<p>\nAbout 15 years ago, to capture US government business, Sun developed an operating system that met their stringent security requirements.  At that time, it was known as Compartmented Mode Workstation (CMW), at B1\u00c2\u00b9 level.  Today, Sun&apos;s Trusted Solaris is the only commercially available multi-level operating system that runs on standardized, readily available computers.  It has long been certified with more profiles in Common Criteria, at EAL4\u00c2\u00b2 level, than Linux, Windows, AIX, HPUX, and many more commercial operating systems.<\/p>\n<div class=\"sidebar\">\n<p>Solaris 10 with Solaris Trusted Extensions is now under evaluation for the highest level of certification for any commercial operating system. Solaris Trusted Extensions allow customers who have specific regulatory compliance or information protection requirements (such as in the government, financial, and healthcare industries) to take advantage of secure labeling features previously only available in highly specialized operating systems or appliances.\n<\/p><\/div>\n<p>\nOver the past decade, Solaris engineers merged two code bases step by step.  The hugely popular Solaris 10 represent the pinnacle of this merger.  There is no more two distinct operating systems.  Solaris 10 and Trusted Solaris is now one.  Few features that only very security sensitive customers want are collected into what will be marketed as the Trusted Extensions to Solaris (we call it TX for short).<\/p>\n<p>\nWhat exactly make this operating system extension the most secure one?  A simple concept and meticulous polishing the details over the long years.  The concept is <i>Mandatory Access Control<\/i>.<\/p>\n<p>\nFor other operating systems, access control is <i>discretionary<\/i>.  The individual that owns a document may grant others accessing privileges, such as reading, erasing, modification, or backing up.  When the document changes ownership, all bets are off. Some software implements Digital Right Management (DRAM) control over documents with encryption technology (e.g. only the one with the password may open this file), but those controls can be easier circumvented.<\/p>\n<p>\nIn a system with Mandatory Access Control, all documents are labeled and all individuals too.  An individual may access the document only when her label matches the document&apos;s.  For example, an individual with the <i>manager<\/i> label may read documents that were labeled <i>for manager only<\/i>.  Labels are hierarchical.  A &#8220;senior&#8221; label can assume all privileges of a &#8220;junior&#8221; one and more.  This matching follows a set of policies that are separately and independently established.  This concept is also called &#8220;multi-level security&#8221; in the circle.<\/p>\n<p>\nThis concept is easier described than implemented.  In addition to file system modifications, Solaris engineer must also enhance desktop, networking, printing, even devices such as USB and microphone (think about it).  In addition, a comprehensive and secure auditing mechanism was put in place to capture all attempts to circumvent security.  To simplify the policies, they also designed <i>Role-Based Access Control<\/i> so that complicated matching rules can be simplified.  Sun is the only commercial company that knows how to do these right \u00e2\u20ac\u201d securely with high performance.  Their knowlege is decades ahead.<\/p>\n<hr \/>\n<div class=\"code\">\n<p>\n\u00c2\u00b9In the old days, security levels are classified as A1, B3, B2, B1, C2, and lastly, C1.  These classifications are nicely written up in the famous &#8220;<a href=\"http:\/\/www.dynamoo.com\/orange\/\">Orange Book<\/a>&#8221; that is no longer used.  Most people use the term &#8220;B1&#8221; as a short-hand to the equivalent of a set of Common Criteria profiles.<\/p>\n<p>\u00c2\u00b2These days, the security levels are determined by the <i>protection profiles<\/i> and the <i>evaluation level<\/i>.  The profile determines what the product is good for.  Solaris 10 Trusted Extension will have CAPP, RBACPP, and LSPP profiles.  The evaluation level tell you how vigorous the evaluation process was.  Any level less than 3 is not worth even mentioning.  TX will be at least level 4.\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Throughout my tenure at the security post, I never quite figured out why is Trusted Solaris so esoteric. This lesser known operating system can give your enterprise a competitive edge and it is absolutely available to everyone in the world. &hellip; <a href=\"http:\/\/www.nomadicminds.org\/blogs\/2006\/09\/suns-best-kept-secret-is-out\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[77],"tags":[],"_links":{"self":[{"href":"http:\/\/www.nomadicminds.org\/blogs\/wp-json\/wp\/v2\/posts\/175"}],"collection":[{"href":"http:\/\/www.nomadicminds.org\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.nomadicminds.org\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.nomadicminds.org\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.nomadicminds.org\/blogs\/wp-json\/wp\/v2\/comments?post=175"}],"version-history":[{"count":0,"href":"http:\/\/www.nomadicminds.org\/blogs\/wp-json\/wp\/v2\/posts\/175\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.nomadicminds.org\/blogs\/wp-json\/wp\/v2\/media?parent=175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.nomadicminds.org\/blogs\/wp-json\/wp\/v2\/categories?post=175"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.nomadicminds.org\/blogs\/wp-json\/wp\/v2\/tags?post=175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}