News Stay informed about the latest enterprise technology news and product updates.

Automated tool at LinuxWorld reduces security risk

A Trusted Computer Solutions security tool helps protect Linux servers from attack. The tool will be featured at the 2008 LinuxWorld show.

Despite the risks of viruses and malicious attacks, most Linux Web servers are inadequately protected against intrusion.

For more on LinuxWorld 2008 and Linux security:
LinuxWorld 2008 conference coverage

IBM engineer touts SELinux at LinuxWorld workshop

Red Hat Linux locked down per DoD, CIS security guidelines

In a preview of his security workshop presentation at LinuxWorld Conference & Expo, Edward Hammersla, the chief operating officer of Herndon, Va.-based Trusted Computer Solutions Inc., said that nearly one-quarter of all Linux Internet-facing servers are not locked down or secured against intrusion because of time and expense. And according to industry studies, another 50% are locked down manually with scripts.

So while 25% of Linux servers are probably secure, as much as 75% may be fully or somewhat at risk.

Security settings need configuration
Even Red Hat Enterprise Linux, which includes SELinux (Security Enhanced Linux) with access protection, is shipped with all the settings wide open to facilitate installation, and out of the box the distribution would fail more than half of industry security guidelines, Hammersla said. Ditto for Solaris 10 with Trusted Extensions, the other most secure Unix operating system.

As much as 75% of Linux servers may be fully or somewhat at risk.

"All studies agree that administrators needs to pay greater attention to locking down operating systems," Hammersla said. "Even with SELinux, you have to turn on the SE features. And you have to know where they are to activate them."

Another major area of vulnerability is server passwords, which are administered manually, he said.

But luckily, Hammersla has a fix. Trusted Computer Solutions has an automated scanning tool that searches all servers for conformity to 160 commercial and military guidelines and identifies vulnerabilities, he said. Its Security Blanket complements and extends SELinux to ensure that the operating system and applications run safely, he said.

"The operating system is a traditionally overlooked piece of Linux security, Hammersla said. "With the proper tools, this can be done easily and result in a far more secure operation."

Let us know what you think about the story; email Pam Derringer, News Writer . And check out Enterprise Linux Log.

Dig Deeper on Linux servers

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.