Towards Measured Boot Out of the Box
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Security of the boot chain is vital
UEFI Secure Boot
No way to prove verification happened
Compromised servers
Modified laptops
Can't protect against hardware attacks
Trusted Platform Module
Small chip
Platform Configuration Registers
Trusted GRUB
Traditional approach
Unimportant configuration changes alter values
Use the logfile
Log entry contains description of binary and hash of binary
Log entry contains text and hash of text
Policy describes regular expressions
Coreos builds policy automatically on OS release
Use UEFI variables
Disk encryption keys
No secure boot support
Incompatible with runtime UEFI
Ship bootloader support Ship known-good measurements Integration with firmware updates Deterministic initramfs generation
Taught by
Linux Foundation
Tags
Related Courses
LPIC-3 Exam 303: SecurityA Cloud Guru Overview of Linux
A Cloud Guru Advanced Ethical Hacking
City College of San Francisco via California Community Colleges System Ethical Hacking & Network Defe
City College of San Francisco via California Community Colleges System Check Point Jump Start: Harmony Endpoint Security
Checkpoint via Coursera