The Devil Wears RPM: Continous Security Integration Ikey Doherty - - PowerPoint PPT Presentation

the devil wears rpm
SMART_READER_LITE
LIVE PREVIEW

The Devil Wears RPM: Continous Security Integration Ikey Doherty - - PowerPoint PPT Presentation

The Devil Wears RPM: Continous Security Integration Ikey Doherty Intel Corporation Who are you? Introduction to Ikey Doherty Who are you? Ikey Doherty, software engineer at Intel Part of the Clear Linux* Project for Intel Architecture


slide-1
SLIDE 1

The Devil Wears RPM: Continous Security Integration

Ikey Doherty Intel Corporation

slide-2
SLIDE 2

Who are you?

Introduction to Ikey Doherty

slide-3
SLIDE 3

Who are you?

■ Ikey Doherty, software engineer at Intel ■ Part of the Clear Linux* Project for Intel Architecture ■ Developer of the cve-check-tool ■ Long-time distribution engineer (8+ years) ■ GNOME Foundation member/ GNOME Contributor

slide-4
SLIDE 4

Brief introduction of terms

■ CVE

Common Vulnerabilities & Exposures

■ CVE ID

Unique identifier for a given CVE

■ NVD

National Vulnerability Database

■ RPM

RPM Package manager

slide-5
SLIDE 5

The Problem

What’s the big deal?

slide-6
SLIDE 6

CVEs are constantly being announced for many software packages

No automated solution to detect

  • ld and new CVEs in a

continously integrated fashion

Old CVEs can easily creep into Linux distributions

Distributions must still (manually) maintain security of software packages

The Problem

slide-7
SLIDE 7

“Anything that can go wrong, will go wrong.”

Murphy’s Law

slide-8
SLIDE 8

The Solution

Continuous Security Integration

slide-9
SLIDE 9

cve-check-tool is purpose built to continously scan Linux* distributions for CVEs

Automation and integration with existing workflows/bug trackers

Finds old and new CVEs by utilising the NVD as a data source, turn-around of 4 hours

Takes away much of the manual labour effort for discovering CVEs

The Solution

slide-10
SLIDE 10

Demo

Quick run of cve-check-tool in a virtualised environment

slide-11
SLIDE 11

The Future

cve-check-tool – but not just for devs

slide-12
SLIDE 12

Enable usage by administrators

Quickly identify issues on deployed systems

Scan thousands of docker images against known data

Multiple data feeds

“Deep scan” – check “bad” code paths and file hashes, greatly increasing surface area

Room for expansion

slide-13
SLIDE 13

Questions?

slide-14
SLIDE 14

https://github.com/ikeydoherty/cve- check-tool https://clearlinux.org/