Open Source Software - National Security Agency

Transcription

OpenSourceSoftwareRELEASES

NSA TechnologyReleased to Open Source SoftwareTHE TECHNOLOGIES LISTED in this booklet weredeveloped within the National Security Agency (NSA)and are now available to the public via Open SourceSoftware (OSS).The NSA Technology Transfer Program (TTP) workswith agency innovators to transfer their technologyfrom the federal laboratory to the commercialmarketplace. This transfer of technology not onlyfosters collaboration and innovation, but it alsoplays a role in strengthening national security bycontributing to the nation’s economic growth.To learn more about NSA’s OSS technologies ortechnology licensing opportunities, contact the NSATTP at tech transfer@nsa.gov or 866-680-4539.www.nsa.gov/techtransferNSA Open Source Software1

APACHE to-dev/femtoA sorted, distributed key/value store that provides robust,scalable data storage and retrieval. It adds cell-based accesscontrol and a server-side programming mechanism thatcan modify key/value pairs at various points in the datamanagement ority-situational-awarenessIdentifies unexpected and prohibited Certificate Authoritycertificates on Windows systems.CONTROL FLOW INTEGRITY tyA proposed hardware-based method for stopping knownmemory corruption exploitation techniques described in the“Hardware Control Flow Integrity for an IT Ecosystem”research A program that reduces the timespan needed for makinga forensic copy of hard drives for forensic analysis.EOWSWill reside on the NSA github repositoryA web enabled prototype tool that implements the OpenChecklist Interactive Language (OCIL) capabilities for creating,managing, and responding to questionnaires.2An indexing and search system for queries on sequencesof bytes that offers lightning-fast searches on data ofarbitrary formats.GOSECUREwww.github.com/iadgov/gosecureAn easy to use and portable Virtual Private Network systembuilt with Linux and a Raspberry Pi ides network situational awareness of Industrial ControlSystems (ICS) and Supervisory Control and Data Acquisition(SCADA) networks to support network security.JAVA PATHFINDER MANGO ojects/jpf-mangoA static code analysis tool that uses formal methods foranalysis. It is part of NASA Ames Java PathFinder projectwhich is a system used to verify executable Java byte ecurityagency/lemongrenadeLog-based transactional graph database engine backed bya single file. The primary use case is to support streaming seedset expansion, iterative correlation, and recursive file processing.NSA Open Source Software3

LOCKLEVELOPALwww.github.com/iadgov/locklevelWill reside on the NSA github repositoryA prototype that demonstrates a method for scoring how wellWindows systems have implemented some of the top 10 IAmitigation rupAssesses the security state of an ARM-based device byexamining the system register interface of the processor.Manages and standardizes existing commercial hard on/openattestationVerifies system integrity by establishing a baselinemeasurement of a system’s Trusted Platform Module (TPM)and monitors for changes in that measurement. Originallybased on NSA’s Host Integrity at Startup (HIS) software.NB GALLERYOZONE zoneplatform/owf-frameworkNB Gallery is a publishing, sharing, and collaborationplatform for Jupyter-based analytics.APACHE NIFInifi.apache.orgAutomates the flow of data between systems. NiFiimplements concepts of Flow-Based Programming andsolves common data flow problems faced by enterprises.ONOPwww.github.com/onopRadically simplifies the operation of enterprise networks withSDN applications that reside on top of an OpenFlow-capablenetwork controller.4A modular suite of “plug and play” services and capabilities,allowing organizations to customize the suite to meet theirspecific environments.PRESSUREWAVEPlan to submit a technology proposal to the ApacheSoftware FoundationCouples corporate object storage capabilities with a flexiblepolicy language for customization of access control, retention,and storage of data within the same system.REDHAWKwww.github.com/redhawksdrA software-defined radio (SDR) framework designedto support the development, deployment, and managementof real-time software radio applications.NSA Open Source Software5

igationimplementationsMeasures the degree to which specific aspects of thetop 10 IA mitigation strategies have been deployed onwindows systems.SCAP SECURITY GUIDE ers security guidance, baselines, and associatedvalidation mechanisms using the Security Content AutomationProtocol (SCAP) for hardening Red Hat products.SECURE HOST BASELINE up Policy Objects, configuration files, compliance checks,and scripts that support implementing the DoD Secure HostBaseline for Windows 10.SECURITY-ENHANCED LINUX (SELINUX)www.github.com/selinuxprojectA mandatory access control mechanism in the Linux kernelthat checks for allowed operations after standard discretionaryaccess controls are checked. It can enforce rules on files andprocesses in a Linux system, and on the actions they perform,based on defined policies. SELinux has been part of the Linuxkernel since version 2.6.0.6SECURITY ENHANCEMENTS FORANDROID ines privileged processes based on security policies byenforcing mandatory access control over all android processes.SE for Android has been part of Android since Android 4.3.SIMON AND SPECKwww.github.com/iadgov/simon-speckThe Simon and Speck families of lightweight block ciphers.SYSTEM INTEGRITY MANAGEMENTPLATFORM tomates system configuration and compliance of Linuxoperating systems so they conform to industry best ncy/timelyProvides secure access to time series data stored in unfetterProvides a mechanism for network defenders, securityprofessionals, and decision makers to quantitatively measurethe effectiveness of their security posture.NSA Open Source Software7

WALKOFFwww.github.com/iadgov/walkoffAn Active Cyber Defense development framework enablingorchestration capabilities to be written once and then deployedacross WALKOFF-enabled orchestration slideAn architecture for processing metadata designed to take ina set of streaming events from multiple sources, process themthrough a set of modules, and return meaningful g-messagesRetrieves the definitions of Windows Event Log Messagesembedded in operating system binaries.8NSA Open Source Software9

CREATING PARTNERSHIPSIGNITING INNOVATIONCONTACT USNSA Office of Research& Technology ApplicationsTechnology Transfer ProgramResearch Directorate9800 Savage Road, Suite 6843Ft. Meade, MD 20755-684310(866) 680-4539tech transfer@nsa.govwww.nsa.gov/techtransfer

Provides network situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCAD