By Elizabeth White | Article Rating: |
|
May 9, 2012 08:01 AM EDT | Reads: |
560 |

Red Hat, Inc. and IBM on Wednesday announced that Red Hat Enterprise Linux 5 with the KVM hypervisor on IBM Systems has been awarded Common Criteria Certification at Evaluation Assurance Level 4+ (EAL4+). The Common Criteria is an internationally recognized set of standards used by the federal government and other organizations to assess the security and assurance of technology products. This security certification is the first of its kind for an open source virtualization solution.
With this new certification, the KVM hypervisor on Red Hat Enterprise Linux and IBM x86 servers now meets government security standards allowing open virtualization to be used in homeland security projects, command-and-control operations, and throughout government agencies that previously were limited to proprietary virtualization technologies. This security certification paves the way for governments, financial institutions and other security-conscious agencies to create secure, open virtualized IT environments and private clouds.
Open virtualization offers organizations, including government agencies and financial businesses, the opportunity to reduce costs and increase choice with the enterprise-grade KVM hypervisor.
“This certification highlights the combined power of SELinux and KVM and we expect it to pave the way for broader adoption of private cloud computing infrastructure in government agencies,” said Paul Smith, general manager and vice president, public sector operations, Red Hat. “SELinux addresses common government agency concerns about implementing virtualization because it provides for virtual resources to run in separate containers and protect each one individually in case of intrusion.”
“Security is critically important to all our clients as they share workloads and data through virtualization and in the cloud – and especially so to our government and financial customers around the world”, said Jean Staten Healy, director of Linux, IBM. “Today's announcement confirms that open virtualization and KVM are ready for business and are able to offer high levels of security certification on Red Hat Enterprise Linux and IBM Systems.”
Red Hat Enterprise Linux 5 features Security-Enhanced Linux (SELinux), a joint project developed by the National Security Agency (NSA) and Red Hat. This Common Criteria certification allows producers to use Red Hat Enterprise Linux 5 with the KVM hypervisor with confidence as they host many tenants on the same machine, knowing that their virtual guests will be separated from each other using Mandatory Access Control technology developed by the NSA.
Red Hat Enterprise Linux with the KVM hypervisor on IBM Systems was certified by BSI, Germany's Federal Office for Information Security. To facilitate this certification, Red Hat and IBM worked with atsec information security, a U.S. government and BSI accredited laboratory, which tested and validated the security, performance and reliability of the solution against the Common Criteria Standard for Information Security Evaluation (ISO/IEC 15408) at EAL4+.
The certification of KVM and Red Hat Enterprise Linux 5 applies to IBM System x, BladeCenter and iDataPlex servers.
Red Hat Enterprise Linux 6 with the KVM hypervisor is officially “In Evaluation” for Common Criteria certification at EAL4+.
For more information on IBM visit: www.ibm.com/systems or www.ibm.com/linux.
Published May 9, 2012 Reads 560
Copyright © 2012 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Elizabeth White
Elizabeth is an assistant news editor at SYS-CON Events, Inc. where annual high-energy conferences are created with industry-leading players. Elizabeth works on the SYS-CON Events team behind Cloud Computing Conference & Expo, Virtualization Conference & Expo, GovIT Expo, and the UlitzerLive! New-Media Conference & Expo.
- Ubuntu-based Open Source Linux Mint Tests KDE Version
- NetArt Chooses Open-Xchange to Enter into Cloud Application Business
- Rackspace Starts the Great OpenStack Migration
- Cloud Expo: Architect Full Performance Potential of IaaS Cloud Services
- Hot Tech Firms at the 2012 DoDIIS Conference
- Microsoft Sets Up an Open Source Subsidiary
- Dell and Morphlabs Partner on SSD Cloud
- Piston to Integrate Cloud Foundry & OpenStack
- Dell Buys Mainframe Modernizer in Cloud Push
- Informatica Upgrades Its iPaaS
- Video Streaming Outside The Firewall Market Shares, Strategies, and Forecasts, Worldwide, 2012 to 2018
- Inktank to Commercialize Ceph Big Storage
- Red Hat Executive Appointed to Technology Services Industry Association (TSIA) Support Services Advisory Board
- Ubuntu-based Open Source Linux Mint Tests KDE Version
- What Kind of Software Company Should You Work For?
- NetArt Chooses Open-Xchange to Enter into Cloud Application Business
- Rackspace Starts the Great OpenStack Migration
- TeamDrive 3.0 Unveiled at CeBIT: Brings Enterprise-Grade Security to Cloud File Sharing on the iPhone, iPad and Android
- Cloud Expo: Architect Full Performance Potential of IaaS Cloud Services
- Sorting Through the APM Clutter
- Hot Tech Firms at the 2012 DoDIIS Conference
- Swisscom Floats Red Hat Cloud
- Microsoft Sets Up an Open Source Subsidiary
- Dell and Morphlabs Partner on SSD Cloud
- The i-Technology Right Stuff
- Linux.SYS-CON.com Exclusive: Linus Discloses *Real* Fathers of Linux
- After Ubuntu, Windows Looks Increasingly Bad, Increasingly Archaic, Increasingly Unfriendly
- A Closer Look at Damn Small Linux
- Linus' Top Ten SCO Barbs
- SCO CEO Posts Open Letter to the Open Source Community
- Netscape Co-Founder's 12 Reasons for Growth of Open Source
- Where Are RIA Technologies Headed in 2008?
- *POINT - COUNTERPOINT SPECIAL* What's Wrong with the Open Source Community?
- Introducing "Cooperative Linux" - Linux for Windows, No Less
- Linux.SYS-CON.com Exclusive: What Would UserLinux Look Like?
- Why Recovering a Deleted Ext3 File Is Difficult . . .
- ');
for(i = 0; i < google_ads.length; ++i)
{
document.write('
- ');
document.write('' + google_ads[i].line1 + '
'); document.write('' + google_ads[i].visible_url + '
'); document.write(google_ads[i].line2 + ' ' + google_ads[i].line3); document.write(' ');
}
document.write('