Security Module Stacks: Flexibility and Pitfalls in System Security Configuration

Security Module Stacks: Flexibility and Pitfalls in System Security Configuration

Linux Foundation via YouTube Direct link

Intro

1 of 21

1 of 21

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Security Module Stacks: Flexibility and Pitfalls in System Security Configuration

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Casey Schaufler Kernel developer from the 19705
  3. 3 Linux Security Module Collection of security hook
  4. 4 Security Module Stack A collection of security modules
  5. 5 Major Security Module
  6. 6 Stacking as of 4.18
  7. 7 Security Blobs
  8. 8 Stacking with infrastructure managed blobs
  9. 9 32 bits allows one module's data
  10. 10 Identify which to use
  11. 11 Unrecognized Option
  12. 12 Packet Labeling
  13. 13 Pushed attributes
  14. 14 Netlabel Configuration
  15. 15 Granularity
  16. 16 Redundant purpose
  17. 17 User Space
  18. 18 Networking
  19. 19 Process Attributes
  20. 20 Think twice about using secids
  21. 21 Be careful with state

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.