Red Hat Adds Common Criteria Certification for RHEL 8.2


The world's leading provider of open-source enterprise solutions announced a new Common Criteria Certification for the latest version of their platform.

Red Hat, Inc. has further strengthened its RHEL platform by adding Common Criteria Certification for RHEL 8.2.

For those that aren't familiar with Common Criteria Certifications, the goal with these types of certifications is to assure a product meets specific security criteria for specific computing environments. These certifications go through rigorous validation using standardized and repeatable testing via a third party.

RHEL 8.2 was certified by the National Information Assurance Partnership (NIAP) after the testing and validation were handled by Acumen Security (a U.S. government-accredited lab). The operating system was tested and validated against the Common Criteria Standard for Information Security Evaluation (ISO/IEC 15408) against version 4.2.1 of the NIAP General Purpose Operating System Protection Profile. This process included the Extended Package for Secure Shell (SSH), version 1.0.

Paul Smith, senior vice president and general manager, Public Sector, North America, Red Hat said of the certification, “This first Common Criteria certification for Red Hat Enterprise Linux 8 shows that Red Hat continues to maintain crucial IT security certificates for its next-generation operating system as well as the fact that the world’s leading enterprise Linux platform can now provide a more secure and more intelligent platform for critical and classified deployments while retaining the flexibility, scalability, and innovation of Linux."

For more information, check out the official Red Hat announcement.


Related content

  • Windows security with public key infrastructures
    A rarely used feature for improving security in Windows environments relies on certificates issued for various applications, services, and procedures that is based on a public key infrastructure.
  • SSL/TLS best practices for websites
    SSL and TLS are very complex technologies. If you want to avoid wading through cryptography manuals to harden your HTTPS web server, read on for practical recommendations on establishing, securing, and optimizing your SSL/TLS configuration.
  • A central access manager for SSH, Kubernetes, and others
    Teleport centrally manages logins against various protocols, including SSH, Kubernetes, and databases. Functions such as two-factor authentication are included in the scope of delivery, as is management of your own certificates.
  • Checking Compliance with OpenSCAP

    Testing the system landscape for compliance requirements is not typically an administrator’s favorite task. The fairly new open source framework called OpenSCAP helps take some of the pain out of this chore.

  • Workspace ONE for endpoint management
    VMware Workspace ONE provides a secure and user-friendly digital workplace. We look at the features, components, and architecture of Workspace ONE, as well as application management and simplification of the integration of end devices through user self-enrollment.
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs

Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.