Understanding boot-level security using examples
In this section, we’ll look at how to access the UEFI configuration and then we’ll walk through some of the key security settings that you need to be aware of. We’ll also review some of the pros and cons of such configurations.
Depending upon the distribution (and version of said distribution) of Linux you choose to deploy, the tooling available to you and the complexities around using such are as varied as the weather. Again, I will reiterate that choosing an enterprise-supported version of Linux will ultimately provide a better outcome.
Additionally, the newer your hardware platform is, the more likely you are to have the latest security enhancements in your firmware, CPU, and, of course, your BIOS. Let’s now move on to how one can access those security settings.
Accessing the UEFI configuration
Let me begin by addressing the key step in securing the UEFI configuration. This requires that you...