Analyzing and Improving the Security Properties of Secret Memory
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the security properties of secret memory in this 28-minute conference talk presented by James Bottomley and Mike Rappoport from IBM at a Linux Foundation event. Delve into topics such as trusted kernels, container security, cloud security, and hardware assistance. Learn about the challenges of breaking out of secure environments, techniques for removing guest memory, and the process of installing page tables and modules. Gain insights into what constitutes adequate security measures and how to assess the level of security in various scenarios. Understand the importance of asking the right questions when it comes to system security and discover potential improvements to enhance the protection of sensitive information in memory.
Syllabus
Intro
What are your concerns
How to ask a question
Trusted kernel
Container security
Can we give Mike a mic
What is adequate
How secure is it
The difficulty of breaking out
Removing guest memory
Cloud security
Installing page tables
Installing modules
Hardware assist
Mike Rappoport
Taught by
Linux Foundation
Tags
Related Courses
Maintaining Deployment Security in Microsoft AzurePluralsight Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning Securing Containers and Kubernetes Ecosystem
LinkedIn Learning Performing DevSecOps Automated Security Testing
Pluralsight