Главная
Study mode:
on
1
Intro
2
Marta Rybczynska: about me
3
Scary? Examples of issues from...
4
What will we talk about?
5
Yocto security basics - a subjective view (2/2)
6
What can you have out of the box? (and easily)
7
What a developer should know about CVES
8
Cve-check in Yocto: HOWTO
9
Cve-check console output (fragment)
10
Research on cve-check
11
Proposed cve-check extension (fragment)
12
Security-related layers in Yocto
13
Adding meta-security or sublayers
14
Special case: meta-hardening
15
Using meta-hardening
16
Linux kernel hardening in AllScenariosos
17
Next steps
18
Lessons learnt
19
If you want to learn more about security
Description:
Explore the intricacies of securing a Yocto-based distribution through the case study of AllScenariosOS in this 40-minute conference talk by Marta Rybczynska. Delve into Yocto security basics, learn about out-of-the-box security features, and understand the importance of CVE management for developers. Discover how to implement cve-check in Yocto projects, including console output analysis and potential extensions. Examine security-related layers in Yocto, with a focus on meta-security and the special case of meta-hardening. Gain insights into Linux kernel hardening techniques applied in AllScenariosOS, and explore next steps and lessons learned in distribution security. Acquire valuable knowledge to enhance your understanding of security practices in Yocto-based systems.

Securing a Yocto-based Distribution - The Case of AllScenariosOS

Linux Foundation
Add to list