Security can be enforced in a consistent manner with respect to various computing environments that may be operable in a computing
system. Consistent security criteria can be generated, based on input security criterion, in a computer readable and storable form and stored in a computer readable storage medium, thereby allowing the consistent security criterion to be effectively provided to a computing
system for
enforcement of the input security criterion in a consistent manner with respect to, for example, (a) a first
executable computer code effectively supported by an
Operating System (OS), and (b) a second computer code effectively supported by the
Virtual Computing Environment (VCE). A Trusted Component (TC) can effectively provide a consistent security criterion as a part and / or form that is suitable for a particular computing environment. The TC can, for example, be an automated tool that performs various functions including: verifying the consistency of security criteria, generation and deployment of consistent security criteria, and transformation of security criteria to parts and / or forms suitable for various computing environments. In addition, a
Virtual Computing Environment (VCE) can obtain from the
Operating System (OS) one or more security criteria. The
Virtual Computing Environment (VCE) can be operable in a
Trusted Computing Environment (TCE) and interface with a
Trusted Operating System (TOS) that effectively enforces
Mandatory Access Control (MAC), thereby allowing the Virtual Computing Environment (VCE) to leverage the security provided by the OS. The OS can, for example, be a Security-Enhanced Linux (SELinux)
Operating System operating as a Trusted Component in a Trusted Environment that includes a Trusted Security Agent (TSA) operable to deploy consistent security criteria.