How to Write a Linux Security Module
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Why Do You Want To Write A Linux Security Module? We already have terrific security
When Is A Linux Security Module The Right Choice? Add access control Things controlled by
Restrictive Controls
When Is A Linux Security Module The Wrong Choice?
What Are The Alternatives?
Security Module Don'ts
What Do You Want To Protect?
What Do You Want To Protect it From?
The Hooks And Blobs Of A Linux Security Module
Access Control Hooks
Hooks Are Bail On Fail
State Maintenance Hooks
Access Hook Return values
Infrastructure Managed Security Blobs
Module Details
Setting Blob Sizes
The Blob, the Secid and the Secctx
Lifecycle Management Of A secctx
Credentials
Tasks
proc//attr
Object Based Hooks
Inodes
Traditional File Security Attributes
Extended Attributes
IPC objects and Keys
CONFIG_SECURITY_PATH
Aliases
Symlinks
Hardlinks
Mounts
Mount Namespaces
Network Hooks
Network Labels - Secmark
Network Labels - NetLabel
Taught by
Linux Foundation
Tags
Related Courses
Achieving Linux Kernel Code Execution Through a Malicious USB DeviceBlack Hat via YouTube LBM - A Security Framework for Peripherals within the Linux Kernel
IEEE via YouTube Kernel Runtime Security Instrumentation
Linux Foundation via YouTube Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019
Linux Foundation via YouTube The Why and How of libseccomp
Linux Foundation via YouTube