We live in a digital world, and keeping it safe is our #1 priority. Through our innovative approach to security, we eliminate communication gaps between security teams and developers to ensure the safest systems possible.


SERVICES

  • Operating system customization, development, integration, testing, and debug at all levels of the software stack. 

  • Customized images for installs on physical hardware, virtual machines, containers, and cloud environments. 

  • Software installs, updates, and customization. 

  • STIG hardening, ACAS and SCC scans, CISA IAVAs, NVD, CVEs. 

  • Support of the Risk Management Framework (RMF) process.    

  • Network setup- DHCP, Static IPs, NFS, PXE, firewall 

  • Shell scripting and Ansible automation. 

  • FIPS Encryption

  • User management including RBAC 

  • Storage/file management

  • Hardware/OS integration – detection, drivers,  communication infrastructureand tactical system ATOs. 

  • Implementation of software anti-tamper (AT) using TPMs.

  • Customizations to operating system kernels and drivers. 

  • RPM/software management for COTS/GOTS/FOSS/custom software, including meeting the “Supported Software” RMF guideline.  

High-quality engineering services at all levels of the Linux-based system. From power-on to your applications running smoothly and securely.

Engineering
services

  • In-house red team testing is used to ensure that the system is fortified against attacks and exposes overlooked deficiencies.  

  • Fully customizable and integrated with your applications along with an appropriate service contract. 

  • The operating system comes with default package information, system information, and SCAP compliance results that can be updated as the operating system is modified and customized and provided as part of the ATO package.


Pre-hardened operating system is secured according to DISA STIG and RMF guidelines to provide a secure base for any program.


Pre-Hardened
Operating Systems

  • Privately hosted repository with up-to-date software needed by your program. 

  • Limits packages to only those that are necessary, reducing the number of items that need to be maintained, as well as mitigating associated security risks. 

  • FOSS/COTS/GOTS creation and management including making sure items adhere to the SA-22 Unsupported System Component's security control. 

  • Packages digitally signed with a private GPG key to maintain software integrity.


SOFTWARE PACKAGE MANAGEMENT

  • Wrapper that can be used on new or previously existing systems. 

  • Automated generation of system information, installed software information, network topology, and security scan results to evaluate the current security stance of a system.  

  • Automated security updates and patches based on findings with an available roll-back feature. The information generated can be used when obtaining an initial ATO or during continuous monitoring / ATO renewal of already fielded systems.

System Security
Wrapper

Get in touch to learn how Purple Urchin can protect your business against cybersecurity threats.

Thank You! 

We will be in touch shortly.

Ready to get started? 

Harness the power of the purple.

Send it

Thank You. 

We will be in touch shortly.