Главная
Study mode:
on
1
Intro
2
DISCLAIMERS
3
WHAT IS A CONTAINER?
4
WHY CONTAINERS ON EMBEDDED?
5
CONTAINER INFRASTRUCTURE
6
SECURING THE CONTAINER IMAGE
7
CREATE A MINIMAL CONTAINER IMAGE
8
HANDS-ON: DEBIAN BASED IMAGE
9
HANDS-ON: ALPINE WITH MULTI-STAGE BUILD
10
HANDS-ON: STATICALLY LINKED BINARY
11
CREATE AND RUN IMAGES YOU TRUST
12
STATIC ANALYSIS TOOLS
13
SECURITY SCANNING
14
EASILY UPDATABLE
15
SECURING THE CONTAINER EXECUTION
16
RESTRICT CONTAINER PRIVILEGES
17
DEVICE FILES INSIDE THE CONTAINER
18
USERS INSIDE CONTAINERS
19
HANDS-ON: ENABLING USER NAMESPACE
20
HANDS-ON: USER NAMESPACE IN CONTAINERS
21
RESTRICTING SYSCALLS
22
MANAGING RESOURCE USAGE
23
LINUX SECURITY MODULES
Description:
Explore the intricacies of designing secure containerized applications for embedded Linux devices in this 41-minute conference talk by Sergio Prado from Embedded Labworks. Delve into container fundamentals, their relevance in embedded systems, and essential security measures. Learn to create minimal container images through hands-on examples using Debian, Alpine, and statically linked binaries. Discover techniques for securing container execution, including restricting privileges, managing device files and users, enabling user namespaces, and limiting syscalls. Gain insights into resource management and Linux security modules to enhance the overall security posture of your embedded Linux applications.

Designing Secure Containerized Applications for Embedded Linux Devices

Linux Foundation
Add to list