RedHat working on secure Linux

RedHat is working with IBM and Trusted Computing to deliver a version of RedHat Linux that will meet the needs of sensitive government agencies.

RedHat is working with IBM and Trusted Computing to deliver a version of RedHat Linux that will meet the needs of sensitive government agencies. InformationWeek reported:

Red Hat, with help from IBM and Trusted Computing Solutions, said Tuesday that it plans to put its Red Hat Enterprise Linux operating system through the paces of the National Information Assurance Partnership's Common Criteria evaluation program in a move to create the first "trusted" Linux operating system. When the next iteration of Red Hat Enterprise Linux, version 5, is released in late 2006, it's expected to have a rating of Evaluation Assurance Level 4, or EAL4, and achieve "trusted" status by including labeled security protection profile, controlled access protection profile, and role-based access control protection profile security capabilities.

... A trusted operating system is valuable for government agencies and businesses because it allows system administrators to deliver different levels of security on the same system. For example, an intelligence agency can manage access to secret and top-secret data on a single system, even if users have different security clearance levels. This is useful in the business world as well, as companies seek to provide access to different types of information to different end users, whether they're employees, customers, or business partners.