The event is the only of its kind to examine SELinux and the power of the flexible mandatory access control
security it brings to Linux.
To protect information and ensure accessibility, the software provides robust on-device security including mandatory access control
(with the built-in ability for medical professionals to reset their access code when forgotten) and data encryption that is administratively recoverable in the event an employee is unavailable.
By deploying eTokens with Pointsec's central management and mandatory access control
, administrators can efficiently implement, update, and strengthen their organizations' security policy.
Security: access control lists, security event auditing, extended file system attributes, mandatory access controls
and fine-grained capabilities
Some of the best practices recommended for tokenisation include strong authentication and implementing mandatory access controls
across the tokenisation system, whether for tokenising or de-tokenising data, as well as securing authentication credentials from unauthorised access or use.
SELinux reportedly emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls
, and fine-grained transitions and privilege escalation following the principle of least privilege.
In addition to conforming to Common Criteria requirements for EAL4+, Wind River Linux Secure also provides an additional layer of security through mandatory access controls
, or MAC, along with enabling NSA-developed Security Enhanced Linux, or SELinux.