iTnews
  • Home
  • News
  • Technology
  • Security

U.K. Cabinet Office backs security enhanced Linux

By William Eazel on May 2, 2006 10:58AM

Steve Marsh, director of the U.K. government’s Central Sponsor for Information Assurance (CSIA), has announced that IBM, and its partners Tresys Technology and Belmin Group, are working with the U.K. Cabinet Office to demonstrate one of the first mainstream mandatory access control (MAC) environments. The design is based upon Security Enhanced Linux and IBM WebSphere.

The government set out its vision for efficient, customer-centric public services in November 2005 in the document, "Transformational Government: Enabled by Technology." Given that many of these services would need to be delivered through complex information-supply chains, spanning central government, the wider public sector and private and voluntary sector organisations, the challenge lies in how it can be done securely.

Therefore, the ability to be able to contain security breaches, using approaches such as MAC, can be a significant aid in developing systems that deliver the government's transformational agenda.

"We consider MAC to be a key enabling technology to aid government and businesses alike, in being confident they can deliver more services, more quickly, and with better function, without compromising security," said Marsh.

Gary Barnett, research director at Ovum, said the announcement shows the potential of public-private partnerships.

"This is an important announcement that shows how both government and business can take security to the next level", said Barnett.

"The traditional 'border control' approach to security will no longer be good enough as organizations, including government, are increasingly obliged to grant access to internal systems to a wider range of external parties. MAC addresses this issue by applying the 'need to know' security principle to operating systems, this means that rogue applications or malicious users are automatically contained and cannot cause damage beyond their immediate context. SELinux is the first commercially available operating system to implement this sophisticated level of security, and today's announcement shows how this can be combined with a commercial J2EE application server to form the basis of a complete solution," added Barnett.

Enterprises will also be able to take advantage of the technology, said Doc Shankar, worldwide Linux security lead for IBM.

"What we've demonstrated here with WebSphere and SELinux can be repeated with other software such as DB2 and business applications. In other words through the use of this technology, any organization will have the ability to contain hackers, provide the necessary confinement for its applications and minimize damage to the enterprise," said Shankar.

The proof of concept is planned to go live this month at County Durham & Darlington Acute Hospitals NHS Trust and will focus on providing secure system access for the hospital's new finance system.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
backscabinetenhancedlinuxofficesecurityuk

Partner Content

Digital signatures propel Australian Unity with rapid time to value
Digital signatures propel Australian Unity with rapid time to value
Winning strategies for complaints and disputes management in financial services
Promoted Content Winning strategies for complaints and disputes management in financial services
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By William Eazel
May 2 2006
10:58AM
0 Comments

Related Articles

  • Microsoft patches exploited 'Follina' remote code exec bug
  • Click Studios revokes digital cert used by 'Follina' dropped malware
  • New MS Office zero day evades Defender
  • Patch now against Linux 'Nimbuspwn' root priv-esc bugs
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia sets changeover date for myGov

Services Australia sets changeover date for myGov

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

Australian court finds insurer not liable for ransomware clean-up costs

Australian court finds insurer not liable for ransomware clean-up costs

NBN Co proposes to axe CVC across all plans by mid-2026

NBN Co proposes to axe CVC across all plans by mid-2026

Digital Nation

COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Domino’s invests in observability for zero contact delivery
Domino’s invests in observability for zero contact delivery
Metaverses on the agenda for Dominello, Husic ministerial meeting
Metaverses on the agenda for Dominello, Husic ministerial meeting
Criteo to fork out $94.7m for consent breaches
Criteo to fork out $94.7m for consent breaches
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.