RHEL meets General Purpose Operating System Protection Profile
Requirement Deficiencies There are no missing requirements
Design Deficiencies There are no errors of design that lead to vulnerabilities
Coding Defects There are no implementation defects that create vulnerabilities
Prevention and Detection Processes are in place, staff trained, runtime defenses mitigate latent problems
39
Code Physically Secure The code is kept in a SCC system with access limited to essential personnel
Code Correctness Discuss different classes of errors and how they are detected
Runtime Protections The use of stack protector, FORTIFY SOURCE, RELRO, and kernel sysctls are effective
Independent 3rd Party Code reviews are performed and defects corrected
Static Analysis Tools All code is scanned and important defects are corrected
Test Suite Code exercised by test suite shows no unexpected errors
Operational Guidance The security features are well explained
USGCB, STIGs
Trained Programmers The staff is trained and follows procedures