Cross Domain Solutions: Secure Operating Systems

Business BAE Systems
Location International
Security Hardened Operating Systems are a key part of the BAE Systems Cross Domain Solutions portfolio.

Overview

All BAE Systems' Cross Domain Solutions contain an element of software to realise Cross Domain information exchange. It is imperitive that a secure Operating System is used as the foundation on which to host this critical software. Operating System security is therefore always a priority focus and a key part of our overall Cross Domain Solutions portfolio. While our secure Operating Systems are always integral to our Cross Domain Solution deployments, due to the high-assurance security controls implemented, they are also available as standalone products that can be purchased without a CDS.

We offer two secure Operating Systems:

Secure Trusted Operating Platform (STOP OS®)

Used extensively by the Department of Defense (DoD) and Intelligence Community (IC) to protect sensitive data from sources worldwide, STOP™ - the Secure Trusted Operating Platform - is a trusted multi level operating system with a robust security suite designed from the ground up by BAE Systems with security as its core focus. Field proven, third-party developers choose STOP™ to be certain of security and to differentiate their products in today's competitive market.

XTS Redback OS

The XTS Redback OS, formerly Datagate Certified Datapump (DCD), is a modified distribution of Red Hat Enterprise Linux (RHEL). It has been security hardened in accordance with the Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) for RHEL, as well as security controls from the Australian Cyber Security Centre (ACSC) Essential 8 and the ACSC Information Security Manual (ISM). These controls are unified together within the operating system to reduce vulnerabilities and enhance overall security.

Key Features and Benefits of Secure Operating Systems:

  • Stronger Security Against Threats: They are designed to resist attacks from malware, ransomware, and other cyber threats by implementing various security layers.
  • Data Confidentiality: They ensure sensitive or confidential data remains protected and inaccessible to unauthorised users.
  • Compliance with Regulations: For organisations, they can help meet data protection regulations like GDPR or HIPAA.
  • Reduced Data Leakage Risk: By limiting access to sensitive data and recording activities, they minimise the risk of data breaches.
  • Enhanced Stability and Reliability: They are often more stable and less prone to crashes or malfunctions compared to less secure systems.
  • User Control: Users often have more granular control over security settings, allowing them to customise their security preferences.

Contact us