The Embedded Linux Secuirty Handbook
Written by Matt St. Onge Published by Packt Publishing
Originally titled: Mastering Embedded Linux Systems Security
( This repository will contain scripts and code examples from the book along with all the stuff we couldn't fit -- plus much more)
#About The Book
As Embedded Linux systems become ubiquitous, powering countless devices in our daily lives, they’ve become prime targets for cyberattacks. Through this comprehensive guide to safeguarding your Linux devices, Matt St. Onge equips you with the knowledge and tools to mitigate the risks associated with hardware and software vulnerabilities.
This book starts by exploring the world of embedded systems, the brains behind your everyday appliances and takes you through the different types of embedded systems, their uses, and the platforms they run on, while addressing their unique security challenges and support considerations. You’ll learn to build a successful, secure, and user-friendly solution by exploring the critical hardware and software components that form the foundation of a secure appliance. We won't forget the human element; you'll learn how to configure your system to prevent user errors and maintain its integrity. The book lets you put your newfound knowledge into action, guiding you through designing a robust build chain that supports the entire lifecycle of your appliance solution, enabling seamless updates without your direct involvement.
By the end of this book, you’ll be equipped to adapt your appliance to the ever-evolving threat landscape, ensuring its continued security and functionality in real-world conditions.
Chapters:
- Welcome to the Cyber Security Landscape
- Security Starts at the Design Table
- Applying Design Requirements Criteria - Hardware Selection
- Applying Design Requirements Criteria - The Operating System
- Basic Needs in my Build Chain
- Trusted Platform Module
- Disk Encryption
- Boot, BIOS, and Firmware Security
- RPM-OSTREE and the Immutable Operating System
- Child-proofing the solution - protecting the device from the End-User & their environment
- Knowing the threat landscape - staying informed
- Are my devices' communications and interactions secure?
- Applying Government Security Standards - Systems Hardening
- Customer & Community feedback loops help keep your solution secure
#On Amazon:
https://www.amazon.com/Embedded-Linux-Security-Handbook-deployment/dp/B0DJCDXJ27
#Repository Table of contents: (by folder)
documentation -- this folder contains additional informational resources and documentation
scripts -- this folder contains helpful scripts to use in your lab
CHAP## -- contains files & data specific to a chapter or the exercises found in the book
CHAP##/exercise -- contains lab exercises that supplement exercises for that chapter found in the book
#DISCLAIMER:
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.