Services Company Contact Us Vehicles

UNIX Server Security

The US Department of Defense (DoD) takes IT and network security very seriously. In addition to other precautions, DoD requires that before IT systems can be placed on their networks, those systems must comply with the Security Technical Implementation Guides (STIGs) from the Defense Information Systems Agency (DISA).

A STIG is a methodology for standardized secure installation and maintenance of computer software and hardware. Developed by DISA, STIGs are configuration documents in support of the DoD. The implementation guidelines include recommended configuration and administrative processes, and span the lifecycle of the device. Security Readiness Reviews or SRRs are a set of manual reviews and scripts run on a system to verify compliance with a specific STIG.

Radix II has years of experience in CERT/STIG/SRR compliance, both implementing and maintaining strict DISA and DoD standards across a wide variety of OS, application, and hardware platforms. When your server needs to get online quickly, Radix II can

  • Harden a client's server compliant per the organization's specific security requirements and specifications for corporate, DoD, or other government entities.
  • Make a client's server STIG ready utilizing DISA's SRR.
  • Assist in application testing with STIG compliance.
  • Assist in building a client's server beginning with the operating system installation to reduce the possible vulnerable surface area based on application requirements.
  • Maintain your server in accordance with ongoing DoD CERT taskings, vulnerability scans, and updated DISA SRRs.
Our previous projects have included:
Operating systems:
  • Solaris 8, 9, 10
  • Redhat Enterprise Linux 3, 4, 5
  • Avaya Linux
  • Avaya CentOS
  • SCO OpenServer
Applications:
  • Avaya Telephony
  • Nortel Telephony
  • Apache/Tomcat
  • Nuance
  • Oracle
  • Verint


Copyright Radix II, Inc. 2006-2011  | Last Modified: Jul 01, 2013