Technical data
ASTi Telestra 4 Target Operations & Maintenance Manual (Ver. 1, Rev. K)
Copyright © 2013 Advanced Simulation Technology inc. 25
Chapter 6: Security
6.1. Security and Enhancements
The Telestra 4 product suite is built around Red Hat
®
Enterprise Linux
®
, providing a
communications solution that runs on a fully National Information Assurance Partnership (NIAP)
validated operating system. NIAP is a U.S. Government initiative created to meet the security
testing needs of both information technology (IT) consumers and producers.
To the end user this means that the entire Telestra 4 product suite including the Target and Studio,
runs on an NIAP approved operating system. Couple this with ASTi's Telestra 4 Security Package
and you have an NIAP-approved OS that eliminates all CAT I and II issues while locking down
the platform in a known working configuration and adhering to the most current security
requirements.
Standard Studio and Target security features:
•Red Hat
®
Enterprise Linux
®
version 5.x
• NIAP Approved OS
• Minimal OS Footprint
• Only essential OS elements are included. For example, the Target platform does not
include a desktop environment since it is unnecessary. This aids in eliminating functions
or features that increase security risk.
• User ID and Password Authentication
• This includes the ability to assign unique user ID and passwords to individual accounts.
• Secure Remote Access
• Access is restricted to essential configuration and management elements required for
operation.
• All remote access is provided through secure means and the plain text remote access
capabilities were removed.
• Due to embedded nature of the Target platform, remote access cannot be completely
removed.
• SELinux
• Security Enhanced Linux (SELinux) provides support for MLS (Multi-Level Security)
policies.
• Auditing
• Tracks activities and modifications of the entire system, including file system
operations, process system calls, user actions such as password changes, account
additions/deletions/modification, use of authentication services, and configuration
changes (such as time changes).










