Hardening and secure configuration of embedded devices based on Linux
In this webinar, together with our partner from Limes Security, we look at how the topic of embedded systems security can be implemented in practice. Security does not stop at embedded components. At the same time, more requirements are being placed on securing IoT and industrial components. Secure configuration and hardening play a special role here.
The presentation will cover topics from embedded security and hardening of embedded systems. From the secure configuration of Uboot, to the handling of debug interfaces (UART, JTAG), to general info on what to look for when using Linux in the embedded area. The goal of embedded systems hardening is to reduce the security risk by eliminating potential attack vectors and condensing the attack surface of the system. Our partner Limes Security discusses the basics necessary to achieve this.
- Debug Interfaces: JTAG, UART and co.
- Cryptography with few resources
- Secure Boot with UBOOT: Problems and Solutions
- Secure Firmware process: Encrypted and signed
- Use TLS instead of plain text
- Binary Hardening: Exploit Mitigation (Compile Options)
- OS Hardening: Reduce Kernel features, Ensure secure mount options, Logging, Dedicated users for services, Anti Priv Escalation Things (suid, permission), Secure Access (sshd, per Azure Iot )
- Product and project manager
- Development Manager
- Security managers
- Managing Director
time & place
- 29 September 2022
- 15:00 to 16:00
- Ginzinger Webinar Room
Register now for free