PitBull Trusted Operating System

Cyber Defense Starts with a Trusted Operating System

The PitBull® Trusted Operating System (OS) provides the mandatory access and integrity controls required to protect information at multiple levels. PitBull software enhances Red Hat Linux 6®, providing trusted functionality and high assurance. With heightened focus on protecting information from both internal and external threats, PitBull’s compartmentalization ensures the integrity and control of data is maintained, while data spillage is contained in the event of a breach. PitBull is a commercial solution that is currently deployed worldwide to protect information and networks.

  • Adds a fundamental layer of security
  • Provides foundation for multilevel security
  • Contains data loss and prevents data spillage
  • Reduces insider threat risk
  • Allows for the development of flexible, ironclad security architectures
Contact UsFor More Information

Product Details


  • Adds a fundamental layer of security to ensure integrity for all levels of use
  • Provides foundation for multilevel security
  • Contains data loss and prevents data spillage
  • Reduces insider threat risk
  • Isolates applications, network interfaces, data, and users using simple security labels—does not rely on a complex rule set for isolation
  • Prevents exploitation of bugs in any one application from damaging the entire system or other running applications
  • Controls network resources usable by each application
  • Controls and limits all user and administrator accounts—eliminates superuser vulnerabilities
  • Allows for the development of flexible, ironclad security architectures
  • Consolidates workstations, eliminating the need for multiple computing platforms
  • Installs as an upgrade to an operational system

Additional Features


  • Identification and authentication
  • Discretionary access control
  • Mandatory access control
  • Mandatory integrity labels
  • Privileges
  • Authorizations
  • Security flags
  • Auditing
  • Integrity checking
  • Advanced secure networking

Unique Features

  • MAC and MIC lables supported at the kernel level
  • Provides clearances for both users and processes
  • Supports roles and authorizations
  • Uses poly-instantiated MLS network ports and CIPSO-labeled packets
  • Enforces two-man/four eye login authentication
  • Allows for dual operational/configuration system modes of operation
  • System integrity checks and integrity databases

Industry Standards

  • Exceeds LSPP (EAL4+) Common Criteria requirements
  • Provides Bell-LaPadula-based MAC (mandatory access controls)
  • Supports the MTR-10649 MITRE Label Encoding Format file
  • Supports Biba model MIC (mandatory integrity control) based labels

Software Development Kit

The Software Development Kit is included with the purchase of PitBull. The Kit includes libraries, header files, maintenance pages, and software developer manuals required to write PitBull-specific applications or modify existing applications to become PitBull aware.

Optional Security Features

Building on the PitBull Trusted OS, the optional security features below allow commercial and custom software to be easily configured into trusted, sophisticated network architecture, securing utilities, tools, and scripts. Other benefits include:

  • Streamlines architectures, improves performance, and reduces costs and manpower requirements
  • Allows users to securely access back-end applications via the Internet
  • Enables a modular architecture tailored to a customer’s specific environmental requirements
  • Secure Communications Enforcer: Tightly integrated trusted programs that pass packets between different security partitions. Examines each incoming request and, if validated, directs it to the appropriate service
  • Security Gate: Trusted software component that mediates limited, secure communication between applications or utilities in separate compartments, without allowing direct access to each other’s files
  • Secure Program Launcher: Allows users without powerful authorizations to execute programs that operate at a high level of security, but only in a limited predefined manner


  • PitBull Introductory Training (3-day): Introductory Training course covers all of the basic PitBull features and commands for users, administrators, software developers, and system architects
  • PitBull Software Developer Training (2-day): Designed for software developers who will be writing software for PitBull or adding PitBull security features to existing software. Prerequisite: PitBull Introductory Training
  • PitBull Advanced Training (2 day) (Coming Soon): Designed for administrators, software developers, and system architects; this course covers advanced topics and provides a more in-depth understanding of the PitBull system. Prerequisite: PitBull Introductory Training
  • PitBull Web API Developer Training (2-day) (Coming Soon): Designed for software developers building client software to interact with PitBull-based servers. Prerequisite: PitBull Introductory Training