GOTS

  • Agile Core Services

    Scenario

  • USAF Standard Desktop

    Container

  • DLA Standard Desktop

    Container

  • US Army Gold Master Desktop

    Container

  • DoDIIS Linux

    Container

  • Ozone Widget

    System

  • Forge.mil

    Deployment

  • AgileClient

    Software Asset

  • DCGS Integration Backbone

    Software Asset

  • World Wind

    Software Asset

  • ATRT

    Software Asset

  • ESM Agent

    Software Asset

  • HBSS Agent

    Software Asset

  • SOCET GXP

    Software Asset

  • Unicorn Database

    Software Asset

Test & Security Tools

  • Nessus

    Test Asset

  • Metasploit

    Test Asset

  • Kali Linux

    Test Asset

  • Wireshark

    Test Asset

  • Splunk

    Test Asset

  • SoapUI/LoadUI

    Test Asset

  • Worksoft Certify

    Test Asset

  • SCAP Compliance Checker

    Test Asset

  • CA LISA

    Test Asset

  • Fortify

    Test Asset

  • AppScan

    Test Asset

  • Retina

    Test Asset

  • HP QuickTest Professional

    Test Asset

Utilities

  • Windows Security Lockdown

    Software Asset

  • Linux Security Lockdown

    Software Asset

  • AWS S3 Bucket Service

    Software Asset

  • Linux Package Installer

    Software Asset

  • 7Zip

    Software Asset

  • FileZilla

    Software Asset

  • Join Domain

    Software Asset

  • Create Account

    Software Asset

  • Enable/Disable SELinux

    Software Asset

How-To: Securing Linux (Red Hat 7) Systems

Are you looking to secure your Linux System? A series of HmC security-related assets are available for users to leverage:

  • HmC Red Hat Repository Registration - if you don't have a private package repository include this asset to register your system to the HmC Package Repository
  • Application Installation - install your application with assets. This will vary based on your application and should include security best practices for your application.
  • Lockdown - At this point, you should have your application installed and running. The reason we recommend you lockdown your system after installing the application is that you won't have to fight with scurity controls while trying to get your appliaction running. This step includes running the STIG (tweaking controls as required), locking down the firewall, selinux, tcpwrappers, and installing virus scanning tools and other security monitoring tools required by your CSSP. Here are some example assets:
  • Change passwords - This step is often overlooked and one of the simplest things to do that has a huge impact on the security posture of your system
  • Scanning - After you system is setup, you will want to run compliance and vulnerability scans. HmC provides SCAP and Nessus scanners to accomplish this. You can provide these artifacts to your certifier as part of the accreditation process. Or, better yet, teach the certifiers to use HmC to do the scans.

As part of CONS3RT you can incorporate these assets directly into your recipes, or download and tweak them and upload a version for your own project.