All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Art Wilson" <awilson@tresys.com>
To: "NSA Mailinglist" <selinux@tycho.nsa.gov>,
	"Fedora-Selinux-List" <fedora-selinux-list@redhat.com>
Subject: [ANN] Certifiable Linux Integration Platform (CLIP)
Date: Thu, 8 Feb 2007 15:07:12 -0500	[thread overview]
Message-ID: <6FE441CD9F0C0C479F2D88F959B015888B9FA4@exchange.columbia.tresys.com> (raw)
In-Reply-To: C1EFB0A4.161B9%mayerf@tresys.com

We just announced the Certifiable Linux Integration Platform (CLIP)
project which aims to provide an operating system platform to host
secure applications. The inital release uses strict reference policy to
configure a RHEL 4 installation to support developers in meeting the
Director of Central Intelligence Directive 6/3 "Protecting Sensitive
Compartmented Information within Information Systems" (DCID 6/3)
Protection Level 4 (PL4) requirements. The platform itself is not
certified, but addresses certification requirements that can be met by
the operating system.	

The project is hosted at http://oss.tresys.com/.

Regards,

Art Wilson
Tresys Technology
443-539-0704

-=-=-=-=-=-=-=-=-=-=-=-=-=-

FOR IMMEDIATE RELEASE 

CONTACT: info@tresys.com

Tresys Technology Announces a New Project for a Secure Certifiable Linux
Integration Platform (CLIP)

Columbia, Maryland-February 7, 2007 - Tresys Technology released the
initial beta version of the Certifiable Linux Integration Platform
(CLIP) toolkit for secure solution developments based on Security
Enhanced Linux (SELinux). The toolkit is an open source project that
provides an installation to support developers in meeting security
certification requirements, in particular the Director of Central
Intelligence Directive 6/3 (DCID 6/3) "Protecting Sensitive
Compartmented Information within Information Systems" Protection Level 4
(PL4) requirements.

The initial version of the CLIP toolkit augments a standard SELinux
installation with a Reference Policy-based SELinux configuration and
additional tools to provide the confidentiality, integrity,
availability, and accountability needed to support secure application
deployment. Developers benefit from having the operating system security
relevant configuration provided in a standard package. For additional
security configuration, developers can use other open source projects by
Tresys, the SELinux Integrated Development Environment (SLIDE) or cross
domain solution (CDS) Framework toolkit, to write custom SELinux
policies.

The CLIP toolkit is freely available for download from the Tresys open
source server (oss.tresys.com). It is just one of several
Tresys-developed open source technologies for SELinux. For more
information on CLIP, SLIDE, CDS Framework, and other SELinux
technologies, visit www.tresys.com.

About Tresys Technology

Tresys Technology is a principal open source contributor to Security
Enhanced Linux (SELinux), with an emphasis on making SELinux easier to
use and manage. In addition to its extensive Secure Linux technology
development, services, and training experience, Tresys is developing the
Tresys Brickwall(tm) and Tresys Razor(tm) suite of products to allow
Linux users and administrators to easily leverage the power of SELinux.
Tresys also provides business and government organizations with expert
security engineering services, including security testing, evaluation
and certification support, cryptographic solutions, and security
technology innovation. For more information, visit www.tresys.com.


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

      reply	other threads:[~2007-02-08 20:07 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-02-07 21:36 ANN: NSA Director of Information Assurance to be Keynote Speaker at SELinux Symposium Frank Mayer
2007-02-08 20:07 ` Art Wilson [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=6FE441CD9F0C0C479F2D88F959B015888B9FA4@exchange.columbia.tresys.com \
    --to=awilson@tresys.com \
    --cc=fedora-selinux-list@redhat.com \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.