Главная
Study mode:
on
1
Intro
2
How do you secure a fleet of developer machines?
3
Integrity Measurement Architecture (IMA)
4
Taking IMA further - Extended Validation Module
5
EVM wasn't ideally suited for what we wanted
6
How do we tie these together?
7
What does it look like?
8
But what about interpreted languages?
9
We can add more complexity
10
But hashing is slow
11
Summary
Description:
Explore the integration of Extended Verification Module (EVM) with Linux Security Module (LSM) policy in this 34-minute conference talk by Matthew Garrett from Google. Delve into the challenges of securing developer machines and learn how EVM can enhance file integrity verification. Discover the potential of combining EVM with other Linux security mechanisms to grant privileges based on application metadata and signature validity. Examine the complexities of implementing this approach, including considerations for interpreted languages and performance optimization. Gain insights from Garrett's expertise in desktop Linux security as he presents solutions and discusses future possibilities for improving system integrity and security.

Tying EVM into LSM Policy for Enhanced Linux Security

Linux Foundation
Add to list
0:00 / 0:00