Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Designing Secure Containerized Applications for Embedded Linux Devices

Linux Foundation via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of designing secure containerized applications for embedded Linux devices in this 41-minute conference talk by Sergio Prado from Embedded Labworks. Delve into container fundamentals, their relevance in embedded systems, and essential security measures. Learn to create minimal container images through hands-on examples using Debian, Alpine, and statically linked binaries. Discover techniques for securing container execution, including restricting privileges, managing device files and users, enabling user namespaces, and limiting syscalls. Gain insights into resource management and Linux security modules to enhance the overall security posture of your embedded Linux applications.

Syllabus

Intro
DISCLAIMERS
WHAT IS A CONTAINER?
WHY CONTAINERS ON EMBEDDED?
CONTAINER INFRASTRUCTURE
SECURING THE CONTAINER IMAGE
CREATE A MINIMAL CONTAINER IMAGE
HANDS-ON: DEBIAN BASED IMAGE
HANDS-ON: ALPINE WITH MULTI-STAGE BUILD
HANDS-ON: STATICALLY LINKED BINARY
CREATE AND RUN IMAGES YOU TRUST
STATIC ANALYSIS TOOLS
SECURITY SCANNING
EASILY UPDATABLE
SECURING THE CONTAINER EXECUTION
RESTRICT CONTAINER PRIVILEGES
DEVICE FILES INSIDE THE CONTAINER
USERS INSIDE CONTAINERS
HANDS-ON: ENABLING USER NAMESPACE
HANDS-ON: USER NAMESPACE IN CONTAINERS
RESTRICTING SYSCALLS
MANAGING RESOURCE USAGE
LINUX SECURITY MODULES

Taught by

Linux Foundation

Reviews

Start your review of Designing Secure Containerized Applications for Embedded Linux Devices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.