The Embedded Linux Security Handbook - Matthew David St. Onge

The Embedded Linux Security Handbook

Fortify your embedded Linux systems from design to deployment
Buch | Softcover
2025
Packt Publishing Limited (Verlag)
978-1-83588-564-2 (ISBN)
52,35 inkl. MwSt
  • Titel nicht im Sortiment
  • Artikel merken
Authored by Linux and open-source expert Matt St. Onge, this definitive guide helps you build and secure Linux-based appliances capable of withstanding the latest cyber threats

Key Features

Develop secure, user-friendly interfaces with streamlined configuration, updates, and lifecycle support
Learn about popular security techniques for embedded Linux and how to integrate them into the development process
Integrate advanced hardware and software security features to enhance your solution’s resilience
Purchase of the print or Kindle book includes a free PDF eBook

Book DescriptionAs Embedded Linux systems become ubiquitous, powering countless devices in our daily lives, they’ve become prime targets for cyberattacks. Through this comprehensive guide to safeguarding your Linux devices, Matt St. Onge equips you with the knowledge and tools to mitigate the risks associated with hardware and software vulnerabilities.
This book starts by exploring the world of embedded systems, the brains behind your everyday appliances and takes you through the different types of embedded systems, their uses, and the platforms they run on, while addressing their unique security challenges and support considerations. You’ll learn to build a successful, secure, and user-friendly solution by exploring the critical hardware and software components that form the foundation of a secure appliance. We won't forget the human element; you'll learn how to configure your system to prevent user errors and maintain its integrity. The book lets you put your newfound knowledge into action, guiding you through designing a robust build chain that supports the entire lifecycle of your appliance solution, enabling seamless updates without your direct involvement.
By the end of this book, you’ll be equipped to adapt your appliance to the ever-evolving threat landscape, ensuring its continued security and functionality in real-world conditions.What you will learn

Understand how to determine the optimal hardware platform based on design criteria
Recognize the importance of security by design in embedded systems
Implement advanced security measures such as TPM, LUKS encryption, and secure boot processes
Discover best practices for secure lifecycle management, including appliance update and upgrade mechanisms
Create a secure software supply chain efficiently
Implement child-proofing by controlling access and resources on the appliance

Who this book is forThis book equips embedded systems professionals, embedded software engineers, and Linux security professionals with the skills needed to address critical security requirements during the design, development, and testing of software for embedded systems. If you’re a product manager or architect, this book will guide you in identifying and integrating essential security features based on the specific platforms and their intended users.

Matt St. Onge, with over 30 years of technology experience, has been a longtime advocate, engineer, and thought leader in the Linux and Open Source industry. He's spent the past decade helping product teams design, prototype and then build more secure and resilient embedded Linux systems across North America and globally during his tenure at Red Hat. Some of Matt's other career position highlights are director of presales engineering, Principal Architect, owner of a consulting company, and US Army veteran. Matt has been an active contributor to Open Source as well. His recent contributions can be publicly accessed freely via GitHub.

Table of Contents

Welcome to the Cyber Security Landscape
Security Starts at the Design Table
Applying Design Requirements Criteria - Hardware Selection
Applying Design Requirements Criteria - The Operating System
Basic Needs in my Build Chain
Trusted Platform Module
Disk Encryption
Boot, BIOS, and Firmware Security
RPM-OSTREE and the Immutable Operating System
Child-proofing the solution - protecting the device from the End-User & their environment
Knowing the threat landscape - staying informed
Are my devices' communications and interactions secure?
Applying Government Security Standards - Systems Hardening
Customer & Community feedback loops help keep your solution secure

Erscheinungsdatum
Verlagsort Birmingham
Sprache englisch
Maße 191 x 235 mm
Themenwelt Informatik Betriebssysteme / Server Unix / Linux
Mathematik / Informatik Informatik Netzwerke
Informatik Weitere Themen Hardware
ISBN-10 1-83588-564-0 / 1835885640
ISBN-13 978-1-83588-564-2 / 9781835885642
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Die wichtigen Befehle

von Daniel J. Barrett

Buch | Softcover (2024)
O'Reilly (Verlag)
16,90
das umfassende Handbuch

von Dirk Deimeke; Daniel van Soest; Stefan Kania

Buch | Hardcover (2023)
Rheinwerk (Verlag)
69,90
das umfassende Handbuch

von Michael Kofler

Buch | Hardcover (2023)
Rheinwerk (Verlag)
49,90