Explore cyber security implementation and validation in embedded Linux systems through a case study of the SEAPATH project. Learn about various types of security requirements, from simple configuration files to complex architecture designs, and their benefits. Compare tools from different distribution providers for implementing and validating security compliance. Gain insights into the BP-028 guidelines for Linux systems, set by France's national cyber security agency (ANSSI), as applied to critical electrical substations. Discover practical approaches to enhance the security of embedded Linux systems in critical infrastructure environments.
Overview
Syllabus
Implementing and Validating Linux Cyber Security Requirements: SEAPATH, a... - Enguerrand & Mathieu
Taught by
Linux Foundation