YoVDO

Hardening Linux for Confidential Cloud Computing - Deep Dive and Results

Offered By: Linux Foundation via YouTube

Tags

Linux Security Courses Cybersecurity Courses Cloud Computing Courses Virtualization Courses Memory Management Courses System Architecture Courses Fuzzing Courses Confidential Computing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of hardening Linux guest systems for confidential cloud computing in this 50-minute technical deep dive presented by Elena Reshetova from Intel. Delve into the evolving security landscape where cloud tenants no longer need to trust the software stack provided by Cloud Service Providers. Examine the efforts to enhance the mainline Linux kernel for use as a secure VM guest kernel, focusing on the treatment of individual kernel subsystems and communication mechanisms. Learn about implemented hardening security mechanisms and gain insights from fuzzing and manual code audit activities. Discover open-source tools and documentation for the project, and engage with discussion points on memory management, transit execution attacks, and other critical aspects of Linux guest hardening for confidential cloud environments.

Syllabus

Introduction
Agenda
Why Harden
Methodology
Approach
MSR
cpids
portal
mmio
PCI config space
KVM specific inputs
Shared Memory
Randomness
Timers
ICPI
Panic
Memory Management
Transit Execution Attacks
Example
Results
Discussion Point
Documentation


Taught by

Linux Foundation

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network