Automated Operating System Lock Down (Hardening) for Linux® and Solaris™
Security Blanket is the only tool that automatically configures your operating systems to meet industry standards and allows for the easy creation of customized security lock down profiles.
Not only do organizations need the ability to automatically assess and configure the security of their operating systems against defined standards, they also need to manage servers at the enterprise level. Whether your IT department has five servers or five hundred, or is running Linux on an IBM® System z® mainframe, Security Blanket has a solution for you. It is a cost-effective way to consistently and predictably secure your enterprise-wide systems in a fraction of the time it takes to lock them down manually.
Supports the following operating systems:
- Red Hat Enterprise Linux 4, 5 & 6
- CentOS 4,5, and 6
- Oracle Enterprise Linux (OEL) 4 & 5
- Fedora 10, 11, 12 and 13
- Solaris 10 (x86 & SPARC)
- Novell SUSE 10 and 11
- openSUSE 10 and 11
Security Blanket allows you to:
- Lock down (Harden) Linux and Solaris operating systems automatically
- Choose pre-defined security profiles or create your own
- Assess current server security configuration
- Remediate identified OS vulnerabilities automatically
- Undo lock downs that compromise functionality
- Baseline and Compare server configurations
- Report on assessments, baselines, and logging events
- Schedule assessments, lock downs, and reporting
Security Blanket has developed security profiles compatible with guidelines published by some of the most respected security leaders in the world:
- Defense Information Systems Agency (DISA) UNIX Security Implementation Technical Guide (STIG)
- SysAdmin, Audit, Network, Security (SANS) Institute
- Payment Card Industry Data Security Standard (PCI DSS)
- Critical Infrastructure Protection (CIP)
- Joint Air Force Army Navy (JAFAN)
- Director of Central Intelligence Directive (DCID) 6/3
- National Industrial Security Program Operating Manual (NISPOM) Chapter 8
- SANS Institute Consensus Audit Guidelines (CAG) Top 20 Critical Controls
- National Security Agency (NSA) Guide, "Guide to the Configuration of Red Hat Enterprise Linux 5"
- Department of Homeland Security (DHS), "Linux Configuration Guidance"