Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Application Whitelisting: Preventing Unknown Software Execution

Linux Foundation via YouTube

Overview

Explore application whitelisting as an effective method for preventing unknown software execution in this 47-minute Linux Foundation conference talk by Steven Grubb from Red Hat. Delve into an open-source implementation, examining various application execution methods and policy design. Learn how to leverage application whitelisting daemon information in real-time to maintain system integrity. Discover the broader security context and strategy, including Common Criteria Requirements, ATTACK to Kill Chain Mapping, and mobile code examples. Examine attack points, file access monitoring techniques, and access control policies. Gain insights into fapolicyd design, safety measures, and sources of trust. Watch a demo, analyze statistics reports, and understand fapolicyd coverage. Explore short-term improvements and the IDS Ensemble Model for a comprehensive understanding of application whitelisting in system security.

Syllabus

SECURITY
Whitelisting Basics
Common Criteria Requirements
Brief Comparison
ATTACK to Kill Chain Mapping
How programs execute
Mobile Code example
Attack points
How to monitor file access?
Fanotify Event
Access Control Policy
Subject statements
Sample Policy
Shipped policy design goals
Fapolicyd Design
Safety Measures
Sources of Trust
Top level SWID tag example
Demo
Statistics report
Fapolicyd coverage
Refinements
Short term improvements
Unifying the pieces
IDS Ensemble Model

Taught by

Linux Foundation

Reviews

Start your review of Application Whitelisting: Preventing Unknown Software Execution

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.