Lab 6 - Securing Operating Systems

Due: Wednesday at 5:00pm
This lab is worth 10 points.

This week's topic in class has been trusted operating systems. For last week's lab, we looked at several operating systems that implement mandatory access control. This week, we will look at what one has to do to modify a commercial operating system to meet minimum evaluation criteria as defined by some certification specification (we will discuss the specifics of evaluation criteria and certification in lecture on Wednesday). The basic idea is to perform a series of configuration changes to increase the assurance one has in certain features of the system. For example, we might increase the assurance that the audit trail keeps an accurate record of events. Most systems that have been certified will publish a checklist of all the configuration changes needed to obtain that certification. In this lab, we will look at a few of those checklists to see what one has to do to secure an operating system "after the fact" rather than using a trusted OS.

Browse through the configuration guides for the following operating systems:

For your writeup, give your overall impression of the ease (or lack of) of securing each system for their Common Criteria evaluation level. What do you see as the biggest issue when implementing the configuration changes listed in the documents? Do you think it would be more or less difficult to instead use a trusted operating system, such as one of the ones we looked at last week with mandatory access control? Your writeup should be 2-3 paragraphs of thoughts on these matters.