Using an open source framework to catch the bad guy

Built-in forensics, incident response, and security with Red Hat Enterprise Linux

December 1, 2010

Mark St. Laurent
Senior solutions architect

Every security policy provides guidance and requirements for ensuring adequate protection of information and data, as well as high-level technical and administrative security requirements for a system in a given environment.

Traditionally, providing security for a system has focused on the confidentiality of the information on it; however protecting the data integrity, and system and data availability are just as important. For example, for processing United States intelligence information, there are 3 attributes that require protection:

  • Confidentiality
  • Integrity
  • Availability