MENU

Fun & Interesting

Introduction to embedded Linux security

Toradex 1,855 4 years ago
Video Not Working? Fix It Now

Security is a key feature in every connected product. But the real question is: what do you want to secure? Do you want to protect the Intellectual Property? Or maybe the integrity of your product? Do you want to secure data at rest? And what about data in transit? These and other questions can be answered with a proper threat modeling process so potential threats can be identified and mitigated. In this webinar, an example of threat modeling to identify the security requirements of an embedded Linux system is discussed, and a wide range of tools and techniques to implement the security requirements is presented, including secure/verified boot, data integrity and encryption, TPM and key management, secure firmware update and patching, secure coding, sandboxing and containers, TEE, mandatory access control (SELinux, AppArmor, etc), authentication, port scanning, and many more! Key Takeaways: - Understand why security is important for your product - Learn how threat modeling can help understand the product's security requirements - Have an idea of what should be secured in an embedded system and why - Learn different tools and techniques to improve the security of an embedded Linux system » i.MX based System on Modules: https://www.toradex.com/computer-on-modules/nxp-freescale-i.mx » Torizon: https://www.toradex.com/torizon » TorizonCore: https://www.toradex.com/operating-systems/torizon 00:00:19 Introduction to Security 00:02:19 Security Concepts 00:07:03 Threat Modeling 00:16:32 Secure Boot Concepts 00:29:27 Code and Data Encryption 00:53:19 Linux Containers | Containers & Security 00:55:37 Trusted Execution Environment (TEE) 00:59:15 Update System and Security 01:11:08 Q&A #EmbeddedLinuxSecurity #EmbeddedSystemsSecurity #ToradexWebinar

Comment