Towards Measured Boot Out of the Box
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Security of the boot chain is vital
UEFI Secure Boot
No way to prove verification happened
Compromised servers
Modified laptops
Can't protect against hardware attacks
Trusted Platform Module
Small chip
Platform Configuration Registers
Trusted GRUB
Traditional approach
Unimportant configuration changes alter values
Use the logfile
Log entry contains description of binary and hash of binary
Log entry contains text and hash of text
Policy describes regular expressions
Coreos builds policy automatically on OS release
Use UEFI variables
Disk encryption keys
No secure boot support
Incompatible with runtime UEFI
Ship bootloader support Ship known-good measurements Integration with firmware updates Deterministic initramfs generation
Taught by
Linux Foundation
Tags
Related Courses
The Complete Cyber Security Course : End Point Protection!Udemy Import and Export Data to Microsoft Azure
Pluralsight Implement virtual machine host security in Azure
Microsoft via Microsoft Learn Administer infrastructure resources in Azure
Microsoft via Microsoft Learn Linux Security and Hardening Essential Training
LinkedIn Learning