Red Hat attains NIAP security compliance

In partnership with IBM, Red Hat has attained National Information Assurance Partnership (NIAP) for Controlled Access Protection Profile compliance.

In partnership with IBM, Red Hat  has attained National Information Assurance Partnership (NIAP) for Controlled Access Protection Profile compliance.

The so-called Common Criteria for Information Security Evaluation (CAPP/EAL4+) provides users with impartial assessment or security evaluation.

It includes an analysis of the IT product and the testing of the product for conformance to a set of security requirements.

Red Hat is also currently in the partnership process with HP for EAL 4 certification. This level of security represents the highest level of certification for an operating platform.

Along with the EAL 4 certification, Red Hat's Cryptography Libraries and Security Platform  have been certified under the FIPS 140-2 evaluation criteria.

Red Hat has received certification with NSS for key algorithms AES, Triple DES and SHS. This certification ensures the Red Hat Certificate System now meets the requirements set for strong cryptography controls in the US government, the company said.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close