the devil wears rpm
play

The Devil Wears RPM: Continous Security Integration Ikey Doherty - PowerPoint PPT Presentation

The Devil Wears RPM: Continous Security Integration Ikey Doherty Intel Corporation Who are you? Introduction to Ikey Doherty Who are you? Ikey Doherty, software engineer at Intel Part of the Clear Linux* Project for Intel Architecture


  1. The Devil Wears RPM: Continous Security Integration Ikey Doherty Intel Corporation

  2. Who are you? Introduction to Ikey Doherty

  3. Who are you? ■ Ikey Doherty, software engineer at Intel ■ Part of the Clear Linux* Project for Intel Architecture ■ Developer of the cve-check-tool ■ Long-time distribution engineer (8+ years) ■ GNOME Foundation member/ GNOME Contributor

  4. Brief introduction of terms ■ CVE Common Vulnerabilities & Exposures ■ CVE ID Unique identifier for a given CVE ■ NVD National Vulnerability Database ■ RPM RPM Package manager

  5. The Problem What’s the big deal?

  6. The Problem CVEs are constantly being ■ announced for many software packages No automated solution to detect ■ old and new CVEs in a continously integrated fashion Old CVEs can easily creep into ■ Linux distributions Distributions must still ■ (manually) maintain security of software packages

  7. “Anything that can go wrong, will go wrong.” Murphy’s Law

  8. The Solution Continuous Security Integration

  9. The Solution cve-check-tool is purpose built to ■ continously scan Linux* distributions for CVEs Automation and integration with ■ existing workflows/bug trackers Finds old and new CVEs by ■ utilising the NVD as a data source, turn-around of 4 hours Takes away much of the manual ■ labour effort for discovering CVEs

  10. Demo Quick run of cve-check-tool in a virtualised environment

  11. The Future cve-check-tool – but not just for devs

  12. Room for expansion Enable usage by administrators ■ Quickly identify issues on ■ deployed systems Scan thousands of docker ■ images against known data Multiple data feeds ■ “Deep scan” – check “bad” code ■ paths and file hashes, greatly increasing surface area

  13. Questions?

  14. https://github.com/ikeydoherty/cve- check-tool https://clearlinux.org/

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend