Bem-vindo,
Faça login na sua conta Red Hat
Login
A conta Red Hat dá acesso ao seu perfil de membro, preferências, e os serviços seguintes, com base em seu status de cliente:
- Portal do cliente
- Central de Parceiros
- Gerenciamento de usuários
- Central de Certificação
Registre-se
Ainda não se registrou? Aqui estão algumas razões pelas quais você deve:
- Procurar artigos da base de conhecimento, gerenciar casos de suporte e subscrições, baixar atualizações, e mais de um lugar.
- Exibir usuários de sua empresa e editar informações, preferências e permissões de contas.
- Gerenciar as suas certificações Red Hat, ver histórico de exames e baixar logotipos e documentos relacionados à certificação.
Editar o seu perfil e as suas preferências
A conta Red Hat dá acesso ao seus perfil de membro, preferências, e outros serviços, dependendo de seu status de cliente.
Para sua segurança, se você estiver em um computador público e terminar de utilizar os serviços Red Hat, não se esqueça de sair.
SairBlog da Red Hat
Blog menu
Government-wide, agencies are turning to open source software to enable faster innovation, lower costs, and better security. For the defense and military industries in particular, there is significant potential for innovation with open source technology. However, with new threats appearing every day, developing advanced solutions that can meet customer requirements for security features, agility and performance is critical.
Red Hat has a long history of working with the federal government and with defense agencies to create solutions that put security first and which can meet the requirements of even the world’s most security-intensive environments. Most recently, the Defense Information Systems Agency (DISA) published a Security Technical Implementation Guide (STIG) for Red Hat Enterprise Linux. This distinction gives government customers the confidence that Red Hat Enterprise Linux 7 can be configured to meet highest security requirements for use within military information systems.
STIGs are the configuration standards for DoD Information Assurance (IA) and IA-enabled devices/systems. They play a critical role enhancing DoD's security systems by providing technical guidance to "lock down" information systems and software that might otherwise be vulnerable to a malicious cyber attack.
The Red Hat Enterprise Linux 7 STIG reflects more than 200 security-relevant configuration checks, with topics including data encryption, secure communications, identity management, and proper configuration of user activity auditing. The publication of the Red Hat Enterprise Linux 7 STIG enables government and military organizations to more easily deploy Red Hat Enterprise Linux 7 with a DoD approved security baseline.
As a precondition of receiving STIG approval, Red Hat Enterprise Linux 7 received Common Criteria certification, an international framework for specifying and testing functional and assurance security requirements in IT products.
Red Hat delivers STIG content natively in Red Hat Enterprise Linux 7, providing U.S. government customers with the ability to deploy directly into the approved DoD configuration without having to make significant additional modifications post-installation