Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn to implement comprehensive security measures for Yocto-built embedded systems through a practical, step-by-step demonstration in this 44-minute conference talk from the Linux Foundation. Follow along as the presenter builds a secure demo system while implementing the official "Making Images More Secure" guidelines from the Yocto Project manual. Discover how to disable Yocto's non-secure default settings, create device-specific credentials, and implement read-only filesystems for enhanced protection. Master techniques for running services with non-root privileges, utilizing systemd's capabilities to create restricted service environments, and applying security-focused compilation flags. Explore kernel and userspace hardening features while learning to identify, check, and remediate security vulnerabilities in your embedded systems. Gain hands-on experience with the meta-security layer and see practical demonstrations of deploying its security-enhancing features in real-world scenarios.
Syllabus
Securing a Yocto Built System - Michael Opdenacker, Root Commit
Taught by
Linux Foundation