Главная
Study mode:
on
1
SECURITY
2
Whitelisting Basics
3
Common Criteria Requirements
4
Brief Comparison
5
ATTACK to Kill Chain Mapping
6
How programs execute
7
Mobile Code example
8
Attack points
9
How to monitor file access?
10
Fanotify Event
11
Access Control Policy
12
Subject statements
13
Sample Policy
14
Shipped policy design goals
15
Fapolicyd Design
16
Safety Measures
17
Sources of Trust
18
Top level SWID tag example
19
Demo
20
Statistics report
21
Fapolicyd coverage
22
Refinements
23
Short term improvements
24
Unifying the pieces
25
IDS Ensemble Model
Description:
Explore application whitelisting as an effective method for preventing unknown software execution in this 47-minute Linux Foundation conference talk by Steven Grubb from Red Hat. Delve into an open-source implementation, examining various application execution methods and policy design. Learn how to leverage application whitelisting daemon information in real-time to maintain system integrity. Discover the broader security context and strategy, including Common Criteria Requirements, ATTACK to Kill Chain Mapping, and mobile code examples. Examine attack points, file access monitoring techniques, and access control policies. Gain insights into fapolicyd design, safety measures, and sources of trust. Watch a demo, analyze statistics reports, and understand fapolicyd coverage. Explore short-term improvements and the IDS Ensemble Model for a comprehensive understanding of application whitelisting in system security.

Application Whitelisting: Preventing Unknown Software Execution

Linux Foundation
Add to list
00:00
-01:13