Главная
Study mode:
on
1
Introduction
2
Platform Security
3
Devices at Google
4
Execution Control
5
Santa
6
Upload
7
Linux
8
Experiment
9
Auditing
10
Protecting
11
Appraisal
12
IMA EVM
13
Extended Attributes
14
Signatures
15
Derivation
16
Demo
17
Keyring Restrictions
18
TLDR
19
Reboots
20
Keybinding Restrictions
21
Using Information
22
Triggering Appraisal
23
Untrusted vs Trusted
24
Trust Chapters
25
Scripts
26
Shebangs
27
NoNewPrince
28
SECMark
29
IP Table
30
Roulette
31
Log Event
32
Log Pipeline
33
Process Trees are Messy
34
Whats Next
35
Security Domain Transition
36
Binary Signing
37
Swift Signatures
38
Working with David Sanford
39
D Package
Description:
Explore a comprehensive conference talk on binary policy implementation using IMA and AppArmor at Google. Dive into the technical aspects of Google's approach to platform security for their vast fleet of developer machines. Learn about novel techniques for providence-based policy on Linux workstations, including targeting IMA signatures and restricting executables from non-Google repositories. Discover the operational challenges of rolling out restrictive policies at scale, and gain insights into binary signing, execution control, and security domain transitions. Examine topics such as Santa, auditing, IMA EVM, extended attributes, keyring restrictions, and process tree complexities. Understand how Google addresses various security concerns, including untrusted vs. trusted executions, script handling, and log event management.

Binary Policy with IMA and AppArmor for Linux Workstations

Linux Foundation
Add to list
0:00 / 0:00