summaryrefslogtreecommitdiffstats
path: root/sec-blueprint/06-application-security.md
diff options
context:
space:
mode:
authorHammad Ahmed <hammad.ahmed@irdeto.com>2017-07-03 15:44:59 -0400
committerHammad Ahmed <hammad.ahmed@irdeto.com>2017-07-17 09:13:49 -0400
commit959b34029e83788121947eb04291a65458034d68 (patch)
treecc2fe52f6c7fc415478632fb5d92aedb862f260e /sec-blueprint/06-application-security.md
parent9db4c56e0fcdda4496f1f249232de8117f3ae11c (diff)
Update AGL security blueprint
Diffstat (limited to 'sec-blueprint/06-application-security.md')
-rw-r--r--sec-blueprint/06-application-security.md67
1 files changed, 67 insertions, 0 deletions
diff --git a/sec-blueprint/06-application-security.md b/sec-blueprint/06-application-security.md
new file mode 100644
index 0000000..44a4622
--- /dev/null
+++ b/sec-blueprint/06-application-security.md
@@ -0,0 +1,67 @@
+---
+
+title : Application Security
+date : 2017-07-07
+categories: architecture, automotive
+tags: architecture, automotive, linux
+layout: techdoc
+
+---
+
+**Table of Content**
+
+1. TOC
+{:toc}
+
+This section describes how the Automotive Grade Linux (AGL) platform
+applies some of the previously described security concepts to
+implement application security
+
+# Application Definition
+The term of Application (App) has a very wide definition in AGL.
+Almost anything which is not in the core Operating System (OS) is an Application.
+Applications can be included in the base software package (image) or
+can be added at run-time.
+
+# Application Installation
+Applications are installed under the control of the Application Framework (AppFw).
+Applications can be delivered and installed with the base image using a
+special offline-mode provided by the Application Framework. Apps can also be installed
+at runtime.
+
+**Note** In early release, default Apps are installed on the image at first boot.
+
+# Application Containment
+Application containment is achieved using the following protections:
+
+* **Linux Native protection**
+ * Mandatory Access Control (SMACK)
+* **AGL Platform protections**
+ * Origin Tracking and Validation
+ * Application Privilege Management and Enforcement via Cynara
+ * Authenticated Transport via D-Bus
+
+## Mandatory Access Control
+Mandatory Access Control (MAC) is a protection provided
+by the Linux kernel that requires a Linux Security Module (LSM).
+AGL uses an LSM called Simplified Mandatory Access Control Kernel (SMACK).
+This protection requires writing SMACK *labels* to the extended attributes of the file
+and then writing a policy to define the behavior of each label.
+The kernel controls access based on these labels
+and this policy.
+For more details on SMACK scheme in AGL, please refer to the
+security platform security document in the security blueprint.
+
+## Origin Tracking and Validation
+Currently, AGL applications are tracked and verified at installation
+time by the application and security framework using SMACK labels.
+For more details, please refer to the application framework documentation.
+
+## Privilege Management and Enforcement
+Application priveleges are managed by Cynara and the security manager
+in the application framework.
+For more details, please refer to the application framework documentation.
+
+## Autenticated Message Transport
+Currently AGL uses the D-Bus interface for transport, using the security
+inherent in this interface.