Главная
Study mode:
on
1
Intro
2
Today's Agenda
3
Runtime Audit Hooks (PED 578)
4
Python Security Engineer Checklist
5
Listening to audit hooks
6
What events should you expect?
7
What to do with an event?
8
Creating audit events
9
Why would you hook io.open_code()?
10
What else do you need to do?
11
Integrating with Windows
12
Windows Event Log features
13
Code Signing
14
Windows Defender Application Control
15
Integrating with Linux
16
Prerequisites
17
DTrace / System Tap instrumentation
18
io.open code() on Linux
19
Extended file attributes
20
Securing xattr
21
Open issues and exploits
22
Summary
23
Resources
Description:
Explore the implementation of security transparency and auditing hooks in CPython with this EuroPython 2019 conference talk. Delve into the motivations behind Python Enhancement Proposals 551 and 578, which aim to detect and prevent anomalous or malicious use of Python. Learn about the concept of auditing hooks and verified open calls for reading code from files, set to be introduced in Python 3.8. Discover how these security enhancements can be integrated with Linux and Windows security frameworks to improve threat detection and prevention. Gain insights into the potential scope, limitations, and future implications of these security measures for the Python community. Examine practical examples, implementation details, and open issues surrounding this initiative to create a more secure Python interpreter while maintaining its usefulness for developers.

Auditing Hooks and Security Transparency for CPython

EuroPython Conference
Add to list