From Linux containers and Kubernetes to edge computing and 5G, modern computing advancements have spread far and wide across the hybrid cloud. But at the center of almost all IT deployments, whether in a core datacenter, at the network’s edge or in the public, is the operating system and, frequently, that operating system is Linux. Red Hat Enterprise Linux (RHEL) remains the world’s leading enterprise Linux platform, and Red Hat is committed to continuing to deliver our flagship operating system as a more secure platform for even the most sensitive workloads.
A big part of maintaining a more secure platform footprint is our work in maintaining a variety of security certifications. Many of Red Hat’s hybrid cloud technologies, from Red Hat OpenShift to Red Hat Storage, rely on RHEL to deliver a trusted foundation that helps drive secure operations across the entire stack. This makes these base components, like Libreswan, GnuTLS, NSS and others, critical to the overall security posture of an IT department...but just being “secure” in the here-and-now is not enough.
To keep pace with the constantly changing world of threats facing IT organizations, Red Hat frequently engages with independent laboratories for security testing and validation of RHEL. This constant testing helps RHEL maintain an extensive set of information security certifications and classifications, including Federal Information Processing Standard 140-2 (FIPS 140-2) and Common Criteria. Recently, in December 2019, we further extended RHEL as a more secure platform for sensitive workloads with the successful re-validation of RHEL 7.6 for FIPS 140-2.
In 2020, we’re continuing this work, with RHEL 7.6 officially entering the In Evaluation phase of Common Criteria testing as of February 6, 2020, and we also intend to submit RHEL 8.1 for Common Criteria evaluation as well in the near future. RHEL 7.6 is being evaluated against version 4.2.1 of the NIAP General Purpose Operating System Protection Profile (OSPP) and progress can be reviewed on the NIAP Products In Evaluation web site.
The operating system forms the heart of more secure enterprise computing, and we are constantly striving to make RHEL the centerpiece of these deployments, regardless of industry or workload.
Mark Thacker is principal product manager, Security Experience, at Red Hat
About the author
Browse by channel
Automation
The latest on IT automation for tech, teams, and environments
Artificial intelligence
Updates on the platforms that free customers to run AI workloads anywhere
Open hybrid cloud
Explore how we build a more flexible future with hybrid cloud
Security
The latest on how we reduce risks across environments and technologies
Edge computing
Updates on the platforms that simplify operations at the edge
Infrastructure
The latest on the world’s leading enterprise Linux platform
Applications
Inside our solutions to the toughest application challenges
Original shows
Entertaining stories from the makers and leaders in enterprise tech
Products
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Cloud services
- See all products
Tools
- Training and certification
- My account
- Customer support
- Developer resources
- Find a partner
- Red Hat Ecosystem Catalog
- Red Hat value calculator
- Documentation
Try, buy, & sell
Communicate
About Red Hat
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
Select a language
Red Hat legal and privacy links
- About Red Hat
- Jobs
- Events
- Locations
- Contact Red Hat
- Red Hat Blog
- Diversity, equity, and inclusion
- Cool Stuff Store
- Red Hat Summit