#Deploying Novell Open Enterprise Server 2 for Linux
Explore tagged Tumblr posts
Link
The Deploying Novell Open Enterprise Server 2 for Linux course (3090) prepares NetWare CNEs to migrate their NetWare/OES services to an OES 2 for Linux server.
0 notes
Text
The Qubes high-security working system features traction within the enterprise
New Post has been published on https://takenews.net/the-qubes-high-security-working-system-features-traction-within-the-enterprise/
The Qubes high-security working system features traction within the enterprise
When nation-state adversaries frolic and gambol throughout your company community, enjoying hide-and-go-seek, sysadmins turn into central factors of compromise. Savvy attackers know that if they’ll personal sysadmins, they’ll personal the community.
“I hunt sysadmins,” an NSA operator brags in a slide leaked by Edward Snowden. No matter what one could consider Snowden, we could conclude that that is how the NSA, and different nation-state predators, consider their prey. Blessed with the keys to the dominion, sysadmins are sitting geese.
So how do you defend your enterprise — your mental property, the integrity of your clients’ knowledge, management of your methods — towards such threats?
The high-security Qubes OS will be an efficient a part of a defense-in-depth answer. “Assume breach and compartmentalize” are clever phrases for each your community and for working system design, and Qubes OS has been driving safe working system innovation with little fanfare for the previous eight years.
Based by safety researcher Joanna Rutkowska of “Blue Tablet” fame, Qubes is constructed on a hypervisor, at the moment Xen, and allows customers to compartmentalize their work into a number of digital machines that map to a number of safety domains. This makes it attainable to segregate high- and low-security duties on the identical machine. Qubes at the moment helps Linux and Home windows digital machines.
“Qubes is very worthwhile in industries the place delicate knowledge needs to be securely segregated, comparable to finance and well being,” says Andrew David Wong, chief communications officer for Invisible Issues Lab, the builders of Qubes, “and it is notably suited to information employees who require entry to untrusted assets whereas creating worthwhile mental property.”
Qubes takes the segregation concept and runs with it, even going as far as to partition networking right into a separate, untrusted digital machine. USB drivers are additionally banished to their very own digital machine (VM) to scale back the chance of USB-based malware. Networkless “vault” VMs are perfect for storing code signing keys, a password supervisor, cryptocurrency wallets, and different delicate knowledge probably of curiosity to a persistent attacker. Disposable VMs cut back the chance of viewing a poisoned web site, and Qubes’s pioneering “convert to trusted PDF” characteristic is now apparently being utilized by recruiters to defend towards malware-laced job purposes.
Till now, nevertheless, Qubes has seen restricted adoption within the enterprise, partly as a consequence of a scarcity of automated deployment and distant administration capabilities. That is set to vary with the approaching launch of Qubes four.Zero, at launch candidate four on the time of this writing.
Qubes four.Zero will provide enterprises the flexibleness to deploy and handle a fleet of hardened Qubes laptops whereas retaining the robust endpoint safety properties that make the working system worthwhile. This makes it simple for sysadmins to supply stronger endpoint safety to tech-savvy customers like software program builders, safety researchers and geekier executives of their organizations.
“This is a crucial milestone for Qubes, and Joanna and group simply preserve crushing it,” Kenn White, a director of the Open Crypto Audit Undertaking, says. “Whereas there aren’t any silver bullets in safety, the hardware-based micro VMs and segmented workspace structure solves so much entire class of widespread vulnerabilities.”
“In a contemporary enterprise surroundings, there is no getting round the necessity to handle e mail attachments, PDFs from untrusted sources, and [Microsoft] Workplace paperwork, all of that are attackers’ favored paths for compromise,” he provides.
Two key parts of Qubes are particularly designed with enterprise customers in thoughts. Qubes Salt stack integration, included in Qubes since Three.2, makes it simple to spin up new laptops preconfigured to go well with the wants of the person. The brand new Qubes Admin API, at the moment obtainable in Qubes four.Zero-rc3, makes distant administration attainable with out the chance of full system compromise.
“Whereas most working methods will be remotely managed, doing so usually requires vital trade-offs in safety and privateness,” Wong, says. “The distant administrator usually has elementary management over managed methods, particularly in company contexts. In contrast, the brand new Qubes Admin AIP permits Qubes installations to be remotely managed with out compromising the standing of the set up as a safe endpoint (i.e., with out entry to dom0).”
The trick lies within the novel concept of a non-privileged admin who has permissions to handle and provision digital machines on a person’s laptop computer remotely, however with out the power to learn the person’s knowledge. Such a design alternative, the Qubes documentation suggests, additionally addresses considerations about admins having limitless energy over customers and the authorized lability that might create for admins or their organizations.
Qubes is very helpful to software program builders working in an enterprise surroundings, Wong suggests. “Software program builders are usually particularly keen on Qubes, because it permits them to take care of separate construct environments and simply check untrusted code in a safe method.”
“Too typically, firms and staff resort to mixing trusted and untrusted actions on the identical machine for the sake of effectivity,” Wong provides. “Qubes solves this drawback elegantly by delivering the safety of limitless remoted containers within the effectivity of a single bodily machine.”
Bonus: Qubes is (largely) efficient towards Meltdown, particularly the brand new four.Zero launch.
One of many frustrations the Qubes group has skilled in growing a brand new, security-focused working system is the elemental incapacity to belief software program and decrease down the stack. Securing the hypervisor at Ring -1 does little good if Intel ME runs a full-blown Minix working system, together with an online server, at Ring -Three, or if the itself is susceptible to assaults like Meltdown and the 2 Spectre variants.
Because it seems, Qubes four.Zero totally virtualized VMs forestall the Meltdown assault, essentially the most highly effective of the three exploits revealed earlier this month that have an effect on most trendy processors. Slightly than congratulate themselves on this success, the Qubes builders are as an alternative in search of methods to create reliable finish factors that do not depend on the underlying .
“About untrustworthiness,” Joanna Rutkowska, founding father of Qubes OS, says. “That is exactly one of many issues that we intend to resolve with Qubes Air.”
The widespread “transfer to the cloud” pattern prompted the Qubes group to rethink endpoint safety. What does endpoint safety imply at a time when knowledge may as probably be in transit or at relaxation on a cloud occasion than at relaxation on a person’s system?
“Readers who’re allergic to the notion of getting their personal computations working within the (untrusted) cloud shouldn’t quit studying simply but,” Rutkowska writes in a weblog put up saying Qubes Air. “The essence of Qubes doesn’t relaxation within the Xen hypervisor, and even within the easy notion of ‘isolation,’ however fairly within the cautious decomposition of varied workflows, gadgets, apps throughout securely compartmentalized containers,” she writes. “We are able to simply think about Qubes working on high of VMs which might be hosted in some cloud, comparable to Amazon EC2, Microsoft Azure, Google Compute Engine, or perhaps a decentralized computing community, comparable to Golem.”
Qubes Air, introduced final week, stays vaporware, however given the Qubes builders’ singular dedication to innovating higher endpoint safety for thus a few years, their eventual success appears inevitable. “Now house owners (or admins) will be capable of distribute their payloads throughout a number of platforms (PCs, cloud VMs, separate computer systems comparable to Raspberry Pis or USB Armory, and many others), nearly seamlessly, working round the issue of treating one platform as a single level of failure,” Rutkowska says, “which is what Qubes has all the time actually been about.”
Qubes OS is free software program and really helpful by many well-known consultants. The challenge estimates there are at the moment round 30 thousand customers. Some gotchas: assist will be finicky and requires VT-x and VT-d to make the most of Qubes’ security measures. Most customers will need loads of RAM. Sysadmins, software program builders, and geekier customers will discover Qubes OS simple to grasp, however the person interface might not be prepared for non-technical finish customers.
This story, “The Qubes high-security working system features traction within the enterprise” was initially printed by CSO.
0 notes
Link
The Deploying Novell Open Enterprise Server 2 for Linux course (3090) prepares NetWare CNEs to migrate their NetWare/OES services to an OES 2 for Linux server.
0 notes
Text
Deploying Novell Open Enterprise Server 2 for Linux [Course 3090]
The Deploying Novell Open Enterprise Server 2 for Linux course (3090) prepares NetWare CNEs to migrate their NetWare/OES services to an OES 2 for Linux server. In addition, this course covers more advanced deployment topics such as support, patches and upgrades, troubleshooting, etc.
Training Level: 3 - Experienced
Key Objectives
During this course you will learn how to complete the following tasks:
· Understand the process for migrating services and data from NetWare to Open Enterprise Server 2 for Linux
· Configure and maintain patches, upgrades, and installation of Novell Open Enterprise Server 2 for Linux
· Understand the principles for supporting Novell Open Enterprise Server 2 for Linux issues, including troubleshooting and maintenance
· Understand storage using Dynamic Storage Technologies (DST)
· Manage the administration of security on Novell Open Enterprise Server 2 for Linux
· Perform configuring tasks for Novell Open Enterprise Server 2 for Linux services
Audience Summary
The audience for this course is the community of NetWare administrators and engineers (CNEs) interested in moving their servers from NetWare to Novell Open Enterprise Server 2 for Linux or installing Novell Open Enterprise Server 2 for Linux servers into their existing network. Additionally, those pursuing the Novell Certified Engineer Enterprise Services (NCE - ES) certification would find this course contains valuable information necessary for their test.
0 notes