Top.Mail.Ru

Scientific and technical journal

«Automation and Informatization of the fuel and energy complex»

ISSN 0132-2222

Integrity monitoring using IMA/EVM in Alt operational system (OS)

UDC: 004.056.5
DOI: -

Authors:

POSHIBAEV VLADIMIR V.1,
KRAYNOV PAVEL A.1

1 National University of Oil and Gas "Gubkin University", Moscow, Russia

Keywords: protection, information, security, Linux, kernel, signature

Annotation:

The Integrity Measurement Architecture (IMA) and Extended Verification Module (EVM) subsystems in Linux are key information protection mechanisms that ensure the integrity of system files and resources. The authors of the article consider the practical implementation of these technologies in the Alt operational system, including configuration, testing, and automation of verification processes. Special attention is paid to the integration of IMA/EVM into the existing infrastructure with minimal impact on the system performance. Practical tests have confirmed that the use of these mechanisms can effectively prevent unauthorized changes of critical files, which is especially important for commercial and government organizations. The developed solutions meet the requirements of Russian standards, including P 57580.1-2017, and can be recommended for deployment on servers and workstations in secured network segments. The test results demonstrate high reliability and stability of the system operation with active integrity control, which makes IMA/EVM a promising tool for ensuring information security in modern IT infrastructures.

Bibliography:

1. Lazorin D.S., Pravikov D.I. Zashchishchennost' kiberfizicheskoy sistemy na osnove tsifrovogo dvoynika cherez otsenku kachestva upravleniya // Avtomatizatsiya i informatizatsiya TEK. – 2024. – № 2(607). – S. 43–47.
2. GOST R 57580.1-2017. Bezopasnost' finansovykh (bankovskikh) operatsiy. Zashchita informatsii finansovykh organizatsiy. Bazovyy sostav organizatsionnykh i tekhnicheskikh mer. – Vved. 2018–01–01. – M.: Standartinform, 2017. – IV, 62 s.
3. Linux IMA/EVM Documentation. – URL: https://www.kernel.org
4. GOST 34.11-2012. Informatsionnaya tekhnologiya. Kriptograficheskaya zashchita informatsii. Funktsiya kheshirovaniya. – Vved. 2013–01–01. – M.: Standartinform, 2013. – IV, 20 s.
5. GOST 34.10-2012. Informatsionnaya tekhnologiya. Kriptograficheskaya zashchita informatsii. Protsessy formirovaniya i proverki elektronnoy tsifrovoy podpisi. – Vved. 2013–01–01. – M.: Standartinform, 2012. – VI, 16 s.
6. Uymin A.G. Praktikum. Demonstratsionnyy ekzamen bazovogo urovnya. Setevoe i sistemnoe administrirovanie: uchebnoe posobie dlya vuzov. – SPb.: Lan', 2024. – 116 s. – (Vysshee obrazovanie).
7. Kuznetsov A.V. Kriptograficheskie metody obespecheniya tselostnosti v OS Linux // Vestnik informatsionnoy bezopasnosti. – 2019. – № 3. – S. 45–52.
8. OS Al't. Rukovodstvo administratora. – URL: https://www.altlinux.org/Документация