What this book covers
Chapter 1, Welcome to the Cyber Security Landscape, introduces the reasons why we are all here on this journey and why security matters.
Chapter 2, Security Starts at the Design Table, as we start our journey together, introduces you to the idea that security is not a feature but rather is built into everything we do by default.
Chapter 3, Applying Design Requirements Criteria – Hardware Selection, reviews the advantages, pitfalls, and reasons for or against the selection of known standard hardware platforms.
Chapter 4, Applying Design Requirements Criteria – the Operating System, continuing on from defining your hardware requirements, identifies existing limitations and features within certain distributions that will also impact your hardware and operating system pairings – much like a fine wine to a great meal.
Chapter 5, Basic Needs in My Build Chain, reviews the many additional components that you will need to leverage in securing your product.
Chapter 6, Disk Encryption, dives deep, with hands-on exercises, into ways to automate the secure encryption of your solutions data.
Chapter 7, The Trusted Platform Module, delves, with hands-on exercises, into leveraging your system’s TPM module to store cryptographic keys and passphrases.
Chapter 8, Boot, BIOS, and Firmware Security, is a hands-on deep dive into securing your BIOS and how your systems boot.
Chapter 9, Image-Based Deployments, explores image-based operating systems and how they can make your solution more secure.
Chapter 10, Childproofing the Solution: Protection from the End-User and Their Environment, reviews methodologies on how to protect your appliance from its end-users while creating a rich, positive user experience.
Chapter 11, Knowing the Threat Landscape – Staying Informed, reviews the treasure trove of resources available to you to keep informed and educated on the ever-changing threat landscape.
Chapter 12, Are My Devices’ Communications and Interactions Secure?, explores how secure devices attached to your Linux system actually are. We’ll also do a hands-on deep dive into ways of securing and encrypting your network communications properly.
Chapter 13, Applying Government Security Standards – System Hardening, does a hands-on deep dive into applying government security standards to our systems.
Chapter 14, Customer and Community Feedback Loops, reviews putting it all together and how to involve your customers, users, and partners in the continuous improvement chain.