Security Module Stacks That Don't Fall Over
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore security module stacking in Linux systems through this informative conference talk. Learn about the potential risks and pitfalls of combining security models, and discover strategies to avoid conflicts when configuring system security. Gain insights into the configuration of existing modules, known conflicts, and best practices for developing new modules using the infrastructure. Delve into networking security challenges and their implications. Benefit from the expertise of Casey Schaufler, the module stacking developer, as he shares his extensive experience in Unix kernels, access control systems, and Linux Security Modules. Understand key concepts such as Blob pointers, SEC IDs, Format Options, Netlabel, and Stacking. Acquire practical tips for effective stacking and troubleshooting techniques. Conclude with an exploration of Friendly Heperm Stacks to enhance your understanding of security module implementation in Linux environments.
Syllabus
Intro
Blob pointers
SEC IDs
Format Options
Netlabel
Stacking
Tips for Stacking
How to Bug
Friendly Heperm
Stacks
Taught by
Linux Foundation
Tags
Related Courses
Linux Server Management and SecurityUniversity of Colorado System via Coursera Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera Operating Systems and Security
IBM via edX Linux Security and Hardening, The Practical Security Guide.
Udemy The Complete Cyber Security Course : Hackers Exposed!
Udemy