YoVDO

Security Module Stacks: Flexibility and Pitfalls in System Security Configuration

Offered By: Linux Foundation via YouTube

Tags

Linux Security Courses Access Control Systems Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of security module stacking in Linux systems with kernel developer Casey Schaufler from Intel. Learn about the new flexibility in configuring system security, potential risks of combining security models, and how to avoid pitfalls. Discover the configuration of existing modules, known conflicts, and best practices for new modules to reduce potential conflicts. Gain insights into networking security challenges and their solutions. Delve into topics such as Linux Security Modules, security blobs, packet labeling, Netlabel configuration, and process attributes. Benefit from Schaufler's extensive experience in Unix kernels, access control systems, and Linux security infrastructure as he shares valuable knowledge on creating robust and useful security module stacks.

Syllabus

Intro
Casey Schaufler Kernel developer from the 19705
Linux Security Module Collection of security hook
Security Module Stack A collection of security modules
Major Security Module
Stacking as of 4.18
Security Blobs
Stacking with infrastructure managed blobs
32 bits allows one module's data
Identify which to use
Unrecognized Option
Packet Labeling
Pushed attributes
Netlabel Configuration
Granularity
Redundant purpose
User Space
Networking
Process Attributes
Think twice about using secids
Be careful with state


Taught by

Linux Foundation

Tags

Related Courses

Access Controls
(ISC)² via Coursera
Cisco Network Security: Secure Access
LinkedIn Learning
Access Control and Identity Management
Pluralsight
IoT Masterclass 2022- Empodérate y crea tu propia Empresa Ya
Udemy
Adventures in Hardware Hacking or Building Expensive Tools on a Budget
0xdade via YouTube