Embedded Systems Hardening - How to protect devices from potential cyber attacks?
Hardening and secure configuration of embedded devices based on Linux
In this webinar, together with our partner from Limes Security, we look at how the topic of embedded systems security can be implemented in practice.
Security does not stop at embedded components. At the same time, more demands are being placed on securing IoT and industrial components. Secure configuration and hardening play a special role here.
The presentation will cover topics from embedded security and hardening of embedded systems. From the secure configuration of Uboot, to dealing with debug interfaces (UART, JTAG), to general info on what to look out for when using Linux in the embedded area.
The goal of embedded systems hardening is to reduce security risk by eliminating potential attack vectors and condensing the system's attack surface. Our partner Limes Security discusses the basics necessary to achieve this.
- Debug Interfaces
+ JTAG, UART and co.
- Kryptographie with less ressources
- Secure Boot with UBOOT
+ Problems and Solutions
- Secure Firmware process
+ Encrypted and signed
+ Use TLS instead of plain text
+ Binary Hardening
- Exploit Mitigation (Compile Options)
+ OS Hardening
- Reduce Kernel features
- Ensure secure mount options
- Dedicated users for services
- Anti Priv Escalation Things (suid, permission)
- Secure Access (sshd, per Azure Iot )
Felix Eberstaller von LIMES Security
Speakers are Felix Eberstaller, IT/IOT Security Specialist and Tobias Zillner, General Manager IT/OT Security Specialist from our partner company Limes Security.
- product- und project manager
- Development Manager
- Security responsible
- Managing Director
Date and place:
- Wednesdy, 15th of september 2021
- 15:00 - 16:00
- Ginzinger Online webinar room
Participation is free of charge. Places are limited.
to the registration