diff options
author | Hammad Ahmed <hammad.ahmed@irdeto.com> | 2017-07-03 15:44:59 -0400 |
---|---|---|
committer | Hammad Ahmed <hammad.ahmed@irdeto.com> | 2017-07-17 09:13:49 -0400 |
commit | 959b34029e83788121947eb04291a65458034d68 (patch) | |
tree | cc2fe52f6c7fc415478632fb5d92aedb862f260e /sec-blueprint/06-application-security.md | |
parent | 9db4c56e0fcdda4496f1f249232de8117f3ae11c (diff) |
Update AGL security blueprint
Diffstat (limited to 'sec-blueprint/06-application-security.md')
-rw-r--r-- | sec-blueprint/06-application-security.md | 67 |
1 files changed, 67 insertions, 0 deletions
diff --git a/sec-blueprint/06-application-security.md b/sec-blueprint/06-application-security.md new file mode 100644 index 0000000..44a4622 --- /dev/null +++ b/sec-blueprint/06-application-security.md @@ -0,0 +1,67 @@ +--- + +title : Application Security +date : 2017-07-07 +categories: architecture, automotive +tags: architecture, automotive, linux +layout: techdoc + +--- + +**Table of Content** + +1. TOC +{:toc} + +This section describes how the Automotive Grade Linux (AGL) platform +applies some of the previously described security concepts to +implement application security + +# Application Definition +The term of Application (App) has a very wide definition in AGL. +Almost anything which is not in the core Operating System (OS) is an Application. +Applications can be included in the base software package (image) or +can be added at run-time. + +# Application Installation +Applications are installed under the control of the Application Framework (AppFw). +Applications can be delivered and installed with the base image using a +special offline-mode provided by the Application Framework. Apps can also be installed +at runtime. + +**Note** In early release, default Apps are installed on the image at first boot. + +# Application Containment +Application containment is achieved using the following protections: + +* **Linux Native protection** + * Mandatory Access Control (SMACK) +* **AGL Platform protections** + * Origin Tracking and Validation + * Application Privilege Management and Enforcement via Cynara + * Authenticated Transport via D-Bus + +## Mandatory Access Control +Mandatory Access Control (MAC) is a protection provided +by the Linux kernel that requires a Linux Security Module (LSM). +AGL uses an LSM called Simplified Mandatory Access Control Kernel (SMACK). +This protection requires writing SMACK *labels* to the extended attributes of the file +and then writing a policy to define the behavior of each label. +The kernel controls access based on these labels +and this policy. +For more details on SMACK scheme in AGL, please refer to the +security platform security document in the security blueprint. + +## Origin Tracking and Validation +Currently, AGL applications are tracked and verified at installation +time by the application and security framework using SMACK labels. +For more details, please refer to the application framework documentation. + +## Privilege Management and Enforcement +Application priveleges are managed by Cynara and the security manager +in the application framework. +For more details, please refer to the application framework documentation. + +## Autenticated Message Transport +Currently AGL uses the D-Bus interface for transport, using the security +inherent in this interface. |