Serdar Yegulalp
Senior Writer

NSA’s new open source project is a cyber security tool

news analysis
Jul 15, 20152 mins

But wariness of the NSA as a software supplier will make it hard for the SIMP cyber security project to attract users

cybersecurity
Credit: Thinkstock

A tool devised by the National Security Agency to “maintain a specific security posture” is now available as an open source project — the first offering on the agency’s recently inaugurated GitHub page.

The Systems Integrity Management Platform (SIMP) tool uses the Puppet framework to ensure network systems running Red Hat Linux remain compliant with established security standards.

Less clear, given NSA’s reputation, is whether anyone outside of a government agency operating under a mandate will use it.

Aside from its controversial origins, SIMP appears to be a fairly straightforward project. It uses Puppet and Ruby to provide automated security management on systems running Red Hat Enterprise Linux 6.6 or 7.1, as well as matching versions of CentOS. The automation follows existing automation guidelines devised by Red Hat and is in compliance with protocols laid down by NIST.

SIMP’s release is part of an ongoing NSA project, the Technology Transfer Program (TTP), that allows its work to be reused by other government agencies and the private sector. The TTP, which has been around since 2006, declassifies technologies developed for previous operations and shares them, typically by way of NDAs and licensing agreements.

With SIMP, the source code is provided as an Apache-licensed project, meaning no NDA is required and its potential for reuse is nearly unlimited. 

The NSA has signaled its willingness to use open source and public computing resources before. Earlier this year it described how it was using the OpenFlow SDN system for its internal operations, citing OpenFlow’s highly granular controls. OpenStack and Hadoop are also part of its tool set, and the agency has released some of the work it’s done with the former — again, on GitHub.

Likewise, SIMP’s maintainers are using several familiar public tools on the project — not only GitHub, but also Google Groups, Gerrithub, HipChat, and JIRA.

All of this is unlikely to lower suspicions of anything bearing NSA’s thumbprint. SIMP will need to gain a third-party imprimatur — for instance, an independent code audit — before anyone will use it, unless required to do so.

Serdar Yegulalp

Serdar Yegulalp is a senior writer at InfoWorld. A veteran technology journalist, Serdar has been writing about computers, operating systems, databases, programming, and other information technology topics for 30 years. Before joining InfoWorld in 2013, Serdar wrote for Windows Magazine, InformationWeek, Byte, and a slew of other publications. At InfoWorld, Serdar has covered software development, devops, containerization, machine learning, and artificial intelligence, winning several B2B journalism awards including a 2024 Neal Award and a 2025 Azbee Award for best instructional content and best how-to article, respectively. He currently focuses on software development tools and technologies and major programming languages including Python, Rust, Go, Zig, and Wasm. Tune into his weekly Dev with Serdar videos for programming tips and techniques and close looks at programming libraries and tools.

More from this author