RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Chord-X

Product
Developers: OKB SAPR
Last Release Date: 2019/12/02
Technology: IB - Authentication,  IB - Firewalls,  IB - Preventing leaks of information,  MCDS - Access control and control systems

Content

The Accord-X Software and Hardware Information Protection System (PAK SZI) is designed to differentiate users' access to workstations running the Linux family OS.

2022: As part of PAK "Aerodisk Machine-V"

On March 11, 2022, Aerodisk, a Russian developer and manufacturer of storage and virtualization solutions, announced the release of the Aerodisk Machine-V software and hardware complex. More details here.

2021 Aerodisk Engine Storage Integration

Aerodisk and OKB SAPR completed the next project for the technical integration of their products - the Aerodisk Engine line of storage systems and solutions for trusted downloads "MKT Accord" and "ACT Accord X K." This was announced by Aerodisk on September 29, 2021. More details here.

2019

Compatibility with Red OS

On December 2, 2019 the RED SOFT company reported that in common and OKB SAPRs confirmed compatibility and correctness of work the PACK ICE "Chord-X" and SPO "K Chord-X" (productions of OKB SAPR) from the operating room sistemoyred to OS.

File:Aquote1.png
Joining forces with other representatives of the domestic IT market, we are confidently moving towards the implementation of an import substitution policy in the field of software. Cooperation with OKB SAPR allows us not only to develop our products, but also to contribute to the technological independence of our country,
comments Rustamov Rustam, Deputy General Director of RED SOFT
File:Aquote2.png

File:Aquote1.png
We highly appreciate the position of the manufacturers of SVT and OS, which consider ensuring compatibility with the means of information protection their task, and not the problem of users. OKB SAPR fully supports this position and is always willing to participate in such inspections and, if necessary, to take steps to ensure compatibility. Domestic products should be chosen not because it is so, but because they work perfectly and are more quickly accompanied. It's in our power,
supported by Igor Grigoryevich Nazarov, General Director of OKB SAPR
File:Aquote2.png

FSTEC certificates of Russia and registration in the Register of Domestic Software

As of December 3, 2019, PAK Accord-X has a certificate FSTEC Russia (No. 3079 from 30.01.2014, valid until 30.01.2020), which confirms its compliance with the requirements information security and allows its use state in information systems. Special PAK software SZI NSD "Accord-X" is registered in for Unified Register of Russian Programs computers databases Ministry of Digital Development, Communications and Mass Media and Russia No. 2027.

SIS ACT from NSD "Accord-X K" is designed to distinguish access to workstations operating under the Linux family OS. ACT SZI from NSD "Accord-X K" has a certificate of the FSTEC of Russia (No. 3760 from 04.07.2014, acts up to 14.07.2020), which confirms its compliance with information security requirements and allows its use in state information systems. Special software SZI NSD "Accord-X K" is registered in the Unified Register of Russian programs for computers and databases of the Ministry of Communications of Russia No. 2131.

Features and Characteristics

Opportunities:

  1. Protection against unauthorized access to PCMs (including the possibility of limiting the permitted hours of operation of each user);
  2. / Identification authentication users prior to download operating system , with the possibility of subsequent transmission of the results of successful identification/to the OS authentications ;
  3. Hardware-based system file integrity control;
  4. Trusted OS download;
  5. Static and dynamic data integrity monitoring and protection against unauthorized modifications;
  6. Differentiate access of users, processes, to data arrays (objects) using discretionary access control;
  7. Differentiate access of users, processes, to data sets (objects) using the client access control;
  8. Differentiate user access to specific processes.
  9. Control access to peripheral devices.
  10. Create an individual sandbox for each user;
  11. Automatically maintain the log of recorded events;
  12. Control of printing on local and network printers, recording of data output for printing, marking of printed data (the marker can be the document secrecy stamp, user name, printer name, document name and other service information).


Main characteristics:

The presence of its own access differentiation system (mandate and discretionary access control methods) - actions allowed by the application software, but prohibited by CHORD - will be prohibited to the user.

During the entire user session, a detailed event log is maintained, in which all user actions are recorded (it is possible to configure the log detail level).

The complex software allows the information security administrator to describe any non-inconsistent security policy based on the most complete set of attributes:

  • access labels that can be named as secrecy levels or in a different, more convenient way (number of
  • tolerance marks can be up to sixteen);