{"id":14084,"date":"2017-02-20T09:00:45","date_gmt":"2017-02-20T14:00:45","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=14084"},"modified":"2020-12-17T04:10:51","modified_gmt":"2020-12-16T17:10:51","slug":"kaspersky-os-7-facts","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-os-7-facts\/14084\/","title":{"rendered":"7 questions about 11-11, answered"},"content":{"rendered":"<p>And now, boys and girls, woo-hoo! Today is a day when woo-hoo\u2019ing seems the most appropriate thing to do. Like this: WOO-HOO!!!<\/p>\n<p>Why, you say?<\/p>\n<p>We\u2019ve officially launched our very own <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2017_Kaspersky-Lab-announces-the-commercial-availability-of-Kaspersky-Operating-System\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">secure operating system<\/a> for network devices, industrial control systems, and the IoT. The OS was originally conceived on November 11; that\u2019s why we refer to it by the code name 11-11. It was a very long development cycle, for sure: we worked on the project for 14 solid years and have even <a href=\"https:\/\/www.theregister.co.uk\/2016\/08\/23\/kasperskyos\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">run a real-world pilot test roll-out<\/a>. Now the OS <s>is ready for consumption<\/s> is available for deployment by all interested parties in a variety of scenarios.<\/p>\n<p>I\u2019ll spare you all the nerdy detail, but if you do want the techy info \u2014 <a href=\"https:\/\/securelist.com\/blog\/security-policies\/77469\/features-of-secure-os-realization\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> it is. I\u2019d rather focus on the things we left out of that post, so I\u2019ll answer some frequently asked questions and debunk some myths about our new OS.<\/p>\n<h2>Why would we need another Linux?<\/h2>\n<p>This is one of the most frequently asked questions. The answer is amazingly simple and straightforward: <b>This is not Linux<\/b>. It\u2019s literally not Linux; there\u2019s not a single string of Linux code in it. We designed the OS from scratch, for different applications and purposes.<\/p>\n<p>What matters most for Linux, Windows, macOS and the like is <em>compatibility<\/em> and <em>universality<\/em>. The developers do their utmost to popularize their solutions by oversimplifying app development and toolsets. But when it comes to our target audiences (hardware developers, SCADA systems, IoT, etc.), this approach is a no-go: What matters most here is <em>security<\/em>.<\/p>\n<p>In order to create a secure environment, we need to enable global <a href=\"https:\/\/eugene.kaspersky.com\/2012\/02\/27\/halt-who-goes-there-or-remedy-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">Default Deny<\/a> at the process level and wrap it into a microkernel. In simple words, it\u2019s a system that does what it\u2019s instructed to and is unable to do anything else. With traditional operating systems, that\u2019s impossible.<\/p>\n<p>However, it\u2019s possible to build security mechanisms into an already functional system. In essence, that\u2019s our <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">core business<\/a>. What we do is enough for many applications. However, with some applications, even the smallest risk of a cyberattack is a disaster. When security has to be guaranteed, we have to build something new. Something that is secure <em>by design<\/em>.<\/p>\n<h3>Oh come on, a secure OS is not news! So what?<\/h3>\n<p>Well, we don\u2019t claim to have created something completely new. Of course there have been other attempts to create a secure OS. At times some projects even succeeded, but the cost of their implementation is on a par with that of an airplane (curiously, such systems were indeed used on airplanes), so such projects were never destined to produce widely applied kit.<\/p>\n<p>Other <a href=\"https:\/\/sel4.systems\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">projects<\/a> were mostly limited to the realm of academic research. In other words, some bright minds would build a microkernel and celebrate with champagne and speeches, and that would basically be it. No project has ever reached the stage of full-scale deployment or commercialization. But a functional vehicle does not end with an engine; it can\u2019t function without wheels, suspension and myriad other important stuff.<\/p>\n<p>We decided to design the system so as to be relevant in different spheres, allowing customization on a granular level, based on application. Basically, we created three products. They are: an OS (KOS), a standalone secure hypervisor (KSH), and a dedicated system for secure interaction among OS components (KSS). They can address various challenges on their own too, depending on the application.<\/p>\n<p>For example, SYSGO, a German company, <a href=\"https:\/\/business.kaspersky.com\/security-within-kaspersky-lab-launches-kaspersky-security-system\/3667\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">licensed<\/a> KSS to use it in its own operating system, PikeOS. Some vendors are interested only in the hypervisor (KSH), which lets them securely run existing applications without modifying them. But for <a href=\"https:\/\/eugene.kaspersky.com\/2016\/11\/15\/finally-our-own-os-oh-yes\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kraftway switches<\/a>, this level of integration was not enough, so they decided to deploy the operating system in full.<\/p>\n<p>In other words, the key advantage of our operating system is its practical, accessible nature; it\u2019s purpose-built rather than designed for generic hypothetical scenarios.<\/p>\n<h3>How would you prove the OS allows only listed operations to run?<\/h3>\n<p>Naturally, as soon as we claimed the system was secure by design, some people refuted the claim, not believing it. That\u2019s absolutely fine: in the world of cybersecurity one should not take anything at face value.<\/p>\n<p>Our operating system\u2019s architecture is based on the principle of dividing objects into the maximum number of isolated entities. Customers may examine the source code to make sure there are no undocumented capabilities inside the system. The rest is in effect configured together with the customer in the shape of various security policies designed to substantiate literally every tiny thing.<\/p>\n<p>The system will do only the things you want it to do. Thus, adversaries won\u2019t be able to take advantage even of a bug in an app created for this OS. Of course, you can write lengthy code with a lot of bugs. But for the code to work, it has to comply with strict policies that define what code can and can\u2019t do.<\/p>\n<h3>Do you really think anything will work on that OS?<\/h3>\n<p>Sure, because our system is extremely flexible! In general, it could be further tweaked to become a mass-market product, but that would require quite a lot of time and resources. Right now we haven\u2019t planned that far ahead, and we see our solution as a niche offering.<\/p>\n<p>Also, keep in mind that it\u2019s possible to port third-party code to the OS. Our solution includes a secure hypervisor, which allows customers to run virtually any operating system as a guest OS and custom application (such as an Linux running Apache server).<\/p>\n<p>Yes, if we could take this server, divide it into many isolated instances and write policies on how they would interact with each other, we\u2019d get a far higher level of security. But it\u2019s an awful lot of work. At the same time, anything is possible if you have enough guts and resources :)<\/p>\n<p>That\u2019s why we enabled custom applications in the hypervisor. Yes, we\u2019ll get an initially secure OS with initially insecure customization. Anything happening inside this customization will be unclear. But we\u2019ll be able to control its interactions with hardware, other customizations, and the outside world. That is already something. With such a configuration, escape from the sandbox is highly unlikely.<\/p>\n<h3>Oh come on, it will collect data anyway<\/h3>\n<p>The kernel does not transmit anything anywhere \u2014 that can be easily checked by looking at the source code (see above). The microkernel has practically nothing in it. All drivers are kept isolated. So to pass any data, one has to write another piece of code. It will be seen quite clearly \u2014 you don\u2019t even have to look at the source code to see it. All of this is written in security policies. And the customer will always be able to audit those policies, regardless of the code. If the policies contain no instructions to send data, the system doesn\u2019t do it.<\/p>\n<h3>Well, OK, but it must cost an arm and a leg<\/h3>\n<p>Frankly, I don\u2019t remember ever buying arms or legs, so I\u2019m not quite up to date on current street prices. But actually this comparison is dubious one. Our OS is not an out-of-the-box product; it\u2019s a <i>project<\/i> offering.<\/p>\n<p>We\u2019re not selling a boxed solution with a cure-all for everyone. Instead, we collaborate with vendors and developers who provide, say, networking equipment, industrial automation systems, automotive solutions, even smart fridges. We provide the code and help configure the system based on their requirements. Consequently, the cost of the solution depends on application and the labor that needs to be invested in the final product.<\/p>\n<h3>Everything can be hacked, and your OS is no exception!<\/h3>\n<p>I agree, no answer is perfect \u2013 except for the number <a href=\"https:\/\/eugene.kaspersky.com\/2014\/09\/01\/the-answer-to-the-ultimate-question-of-life-the-universe-and-everything\/\" target=\"_blank\" rel=\"noopener noreferrer\">42<\/a> :) Anything can happen. However, that\u2019s no reason to give up! The very essence of cybersecurity is to make cybercrooks\u2019 lives as difficult as possible, and make cyberattacks so costly that they become unprofitable business. In this respect, our OS is ahead of any competition.<\/p>\n<p>That\u2019s all for now. Please send any questions via social networks and check out our <a href=\"https:\/\/os.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">website<\/a> to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our very own KasperskyOS operating system is finally out! Here are some useful insights to answer some of your most inquisitive questions.<\/p>\n","protected":false},"author":13,"featured_media":14085,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,7,2647],"tags":[418,1931,1929,1930,522,97],"class_list":{"0":"post-14084","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-products","9":"category-special-projects","10":"tag-faq","11":"tag-hypervisor","12":"tag-kaspersky-os","13":"tag-operating-system","14":"tag-products-2","15":"tag-security-2"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-os-7-facts\/14084\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-os-7-facts\/5946\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/kaspersky-os-7-facts\/4165\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kaspersky-os-7-facts\/10831\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/kaspersky-os-7-facts\/8430\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/kaspersky-os-7-facts\/8952\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/kaspersky-os-7-facts\/10103\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/kaspersky-os-7-facts\/9840\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/kaspersky-os-7-facts\/14132\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-os-7-facts\/2981\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-os-7-facts\/14084\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/kaspersky-os-7-facts\/6738\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/kaspersky-os-7-facts\/9799\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/kaspersky-os-7-facts\/14613\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/kaspersky-os-7-facts\/14132\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-os-7-facts\/14084\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/products-2\/","name":"products"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=14084"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14084\/revisions"}],"predecessor-version":[{"id":28614,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14084\/revisions\/28614"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/14085"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=14084"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=14084"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=14084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}