Configuring and Applying SCAP Policies During Installation

Over the past few decades we have seen great advancements in the IT industry.  In fact, the industry itself seems to be growing at an increasingly faster pace.  However, as the industry grows so to does its evil twin – the figurative sum of all threats to IT security.

On the bright side, along with a steady stream of ever-evolving security issues and threats, there has also been a great effort to mitigate and, when possible, entirely eliminate such threats.  This is accomplished by either fixing the bugs that allowed these issues and threats to exist (in the first place) or by fixing the configurations and protectionary mechanisms of systems so as to prevent attackers from finding success.

As 2015 has been no stranger to news stories about data leakages, various security flaws, and new types of malware – one could easily conclude that “the dark side” is winning this seemingly eternal race.

However, taking the complexity of today’s IT solutions into account

Continue reading “Configuring and Applying SCAP Policies During Installation”

Red Hat Enterprise Linux Virtual Machines: Access to Random Numbers Made Easy

Having access to quality random numbers is essential for correct and secure operation of operating systems. Operating systems need random numbers from an entropy pool for a variety of tasks, like creating secure SSH or GPG/PGP keypairs, generating random PIDs for processes, generating TCP sequence numbers, and generating UUIDs.

With Red Hat Enterprise Linux 7 we introduced the virtio RNG (Random Number Generator) device that provides KVM virtual machines access to entropy from the host machine.  Red Hat Enterprise Virtualization starting version 3.5 also has exposed this feature.  We have since made improvements to Red Hat Enterprise Linux guests to make the feature easier and more straightforward to use.

A Brief Introduction to virtio and Paravirtualized Devices

virtio is the paravirtualized transport framework for KVM virtual machines. Using the virtio framework, new devices can be

Continue reading “Red Hat Enterprise Linux Virtual Machines: Access to Random Numbers Made Easy”

Top 7 Reasons to Use Red Hat Enterprise Linux Atomic Host

In November we announced Red Hat Enterprise Linux 7 Atomic Host Public Beta, a small footprint, container host based on Red Hat Enterprise Linux 7.  It provides a stable host platform, optimized for running application containers, and brings a number of application software packaging and deployment benefits to customers.

What are the top 7 reasons to deploy containers on Red Hat Enterprise Linux 7 Atomic Host?

Continue reading “Top 7 Reasons to Use Red Hat Enterprise Linux Atomic Host”

A New and Improved Installation Experience

The installation software used in Red Hat Enterprise Linux has a long and storied history. Hewn from a stone found deep underground in Durham, North Carolina (during the early days of Red Hat Linux), the installer has grown from a simple single-platform tool to a complex multi-architecture / multi-interface application used to deploy Red Hat Enterprise Linux. After more than ten years with the original evolving code base, the installer engineering team decided to use the advent of a new release of Red Hat Enterprise Linux as the perfect opportunity to make a few significant changes to the installation software. We are excited about these changes and hope that users will find the new installer to be more versatile and easier to use. Here are some of the main improvements and enhancements that you will encounter when working with the new installer for Red Hat Enterprise Linux 7 Beta:

Continue reading “A New and Improved Installation Experience”