SlideShare a Scribd company logo
1 of 37
Download to read offline
Lars Kurth
Community Manger, Xen Project
Chairman, Xen Project Advisory Board
Director, Open Source, Citrix
lars_kurth
Was a contributor to various projects
Worked in parallel computing, tools,
mobile and now virtualization
Community guy for the Xen Project
Working for Citrix
Xen Project Community Manager
Accountable to Xen Project Advisory Board
Chairman of Xen Project Advisory Board
Have worked on Xen Project’s security
practices for 4+ years
Template designed by PresentationGO.com
Identify weak points
of the target
Reconnaissance
Infiltrate &
Maneuver
Deliver targeted
malware to vulnerable
systems: map defences
& weaknesses, create
battle plan, deploy
multiple parallel
attack channels.
Exfiltrate &
Maintain Access
Achieve the intended
objective and back
out leaving no trace
Weaknesses
enabling the
lifecycle
Vulnerabilities,
Malware, Exploits,
Rootkits. Social
Engineering, …
Vulnerability
A weakness in the computational logic of software that, when exploited, results in a negative
impact to confidentiality, integrity, OR availability of that software.
Patch / Live Patch
A fix for a security vulnerability.
A live patch can be applied to a running system
Known vulnerabilities
with patches
Malware
Software designed to disrupt, damage, or gain authorized access to a computer system.
Exploit
Malware designed to take advantage of a vulnerability
This includes file-less/memory based attack techniques (around 14% at end of 2016)
0-Day Exploit
An exploit of an undisclosed/previously unknown vulnerability that is/has been exploited
Rootkit
Software tools that enable unauthorized users to gain control of a computer system without
being detected, some for for a long period of time
Some malware relies on
social engineering: e.g.
phishing, trojans, adware, …
Reactive Services Proactive Services Security Quality Management
Alerts and Warnings
Incident Handling:
analysis, response on site,
response support, response
coordination
Vulnerability Handling:
Vulnerability analysis, response,
response coordination
Artefact Handling: analysis,
response, response coordination
Announcements
Technology Watch
Security Audits or Assessments
Configuration and Maintenance
of Security Tools, Applications,
and Infrastructures
Development of Security Tools
Intrusion Detection Services
Security-Related Information
Dissemination
Vulnerability Bounty Programs
Risk Analysis
Business Continuity and
Disaster Recovery Planning
Security Consulting
Awareness Building
Education/Training
Product Evaluation or
Certification
Products and Distros
Ensure that a fix is available in all product variants that were affected by the vulnerability and ideally
deployed by key customers at the time information of the security issue becomes public.
Cloud Providers and other public facing services
Ensure that a fix is deployed on all public facing hosts that were affected by the vulnerability at the
time information of a security issue becomes public.
Standard: ISO/IEC29147 ➜ ISO/IEC DIS 29147
https://www.first.org
The overall process a CSIRT team goes through when they discover a
vulnerability themselves or one is reported to them directly
In this case we assume that the CSIRT team has full control over all components in their system, which
is normally only the case when the Software stack is proprietary.
The process an open source project’s CSIRT team goes through
(modelled on best practice as used by openwall Distros and Linux
distros, Xen Project and others)
How a commercial CSIRT team interacts with an open source team and
how this constrains what the commercial team can do
Triage
Vulnerability
reported to
organization
Analysis of Issue
Organizational / Planning
Establish Impacted Releases / Customers
Create PoC / Test Case: Understand the
issue, investigate its impact, enable test
that issue is fixed
Impact assessment
Negotiate Disclosure Schedule
Draft issue description
Plan deployment: large organizations need
to make sure that staff across impacted
teams is available
Allocate CVE Number
Issue description
Triage
Analysis of Issue
Vulnerability
reported to
organization
Organizational / Planning
Development of Mitigation
Live Patch Development
Develop fix
Q&A of fix
(formal proof that fix addresses the exploit)
Develop Live Patch
Backport fix/live patch to affected products
Per product validation
Analysis of Issue
Organizational / Planning
Development of Mitigation
Live Patch Development
Deployment
Disclosure
Resource planning
Packaging (bundling of several fixes)
Q&A of packages against affected releases /
customer types
Deployment to affected customers
Disclosure to impacted FOSS project
(if applicable)
Pre-disclosure to important customers
typically under an NDA type agreement
Publish Documentation
Customer notification
This model assumes that the managing CSIRT organization is only
constrained by the wishes of the issue reporter
– This gives such an organization the freedom to for example pre-disclose
information to “important customers”
– And a maximum of freedom on any implementation schedule, assuming it can
convince the discoverer of an issue
– The possibility to not disclose any issues publicly: aka quietly fix them
When open source components are used, significant constraints are put
on what the CSIRT team can do
A similar situation also arises in situations where multiple parties are
impacted (e.g. Spectre, Meltdown)
Triage
Vulnerability
reported to
FOSS
organization
Analysis of Issue
Organizational / Planning
Establish Impacted Releases
Create Test Case: Understand the
issue, investigate its impact, enable test
that issue is fixed
Impact assessment
Negotiate Disclosure Schedule
Draft issue description
Plan deployment: large organizations need
to make sure that staff across impacted
teams is available
Allocate CVE Number
Issue description
Triage
Analysis of Issue
Vulnerability
reported to
FOSS
organization
Organizational / Planning
Development of Mitigation
Develop fix
Q&A of fix
(formal proof that fix addresses the exploit)
Develop Live Patch
Backport fix/live patch to affected products
Per product validation
sue
al / Planning
of Mitigation Pre-Disclosure
Pre-disclosure to qualifying downstream
PSIRTS
Typically fixed time-table (e.g. 2 weeks)
Restricts what CSIRT can do (e.g. no
deployment of fix during embargo)
Collaboration between qualifying CSIRTs
can be restricted
sue
al / Planning
of Mitigation Pre-Disclosure Public Disclosure
Publish Documentation and the fix
Projects might use own channel
Or openwall oss-security
Products and Distros
Ensure that a fix is available in all product variants that were affected by the vulnerability and ideally
deployed by key customers at the time information of the security issue becomes public.
Cloud Providers and other public facing services
Ensure that a fix is deployed on all public facing hosts that were affected by the vulnerability at the
time information of a security issue becomes public.
Whether these goals are achievable, depends on the FOSS Vulnerability
Management Process
Pre-Disclosure Period
Tr
Vulnerabilities
with fixes
predisclosed
to org
Will usually perform triage, because OSS
based product/service typically is modified
(patch queue) and/or use an unusual
configuration.
May choose not to fix a lower severity issue
immediately.
Analysis of Issue
Organizational / Planning
Pre-Disclosure Period
Tr
Vulnerabilities
with fixes
predisclosed
to org
Verify Impacted Releases / Customers
Create PoC / Test Case
Own Impact Assessment
(assessment typically depends on
assumptions that are not always universal)
Plan deployment: large organizations need
to make sure that staff across impacted
teams is available
Product specific issue description
Analysis of Issue
Organizational / Planning
Pre-Disclosure Period
Tr
Vulnerabilities
with fixes
predisclosed
to org
Adaptation of Mitigation
Live Patch Development
Adapt fix
Q&A of fix in own environment
(formal proof that fix addresses the exploit)
Develop Live Patch
Backport fix/live patch to affected products
Per product validation
Vulnerabilities
with fixes
predisclosed
to org
Analysis of Issue
Organizational / Planning
Pre-Disclosure Period
Tr
Packaging & DeploymentAdaptation of Mitigation
Packaging (bundling of several fixes)
Q&A of packages against affected releases /
customer types
Ready delivery channels for publication to
affected customers (e.g. automatic
deployment)
Analysis of Issue
Organizational / Planning
Pre-Disclosure Period
Tr
Packaging & DeploymentAdaptation of Mitigation
If deployment under embargo is permissible:
• Update all hosts that are affected
(typically using live patching)
• In the past (and in theory in some cases
today) some hosts may need to be
rebooted ➜ in such cases, customers
need to be notified during the embargo
period and may need to take action
Vulnerabilities
with fixes
predisclosed
to org
Does it qualify to be on a FOSS project’s pre-disclosure list?
Timetable:
• When is an issue pre-disclosed?
• How many bugs are pre-disclosed at once?
• How long is the disclosure period?
What can be done:
• Deployment under embargo?
• Communicating to affected customers that they need to take action (e.g. scheduled reboots)
• Collaboration with other pre-disclosure list members
Technical:
• FOSS projects may do less than the CSIRT would do normally
• E.g. no live patches, no PoCs, no severity assessment, backports to older versions, …
Orgs qualifying for
pre-disclosure
Openwall
Distros (Linux)
Xen Project OpenStack
FOSS & Commercial
Distros
Commercial & FOSS
Downstreams
Distros, products,
public services,
large users
This means that cloud
and hosting providers
generally do not know
of Linux related
security issues under
pre-disclosure and cannot
plan for, fix or deploy fixes
until they become public
Service Providers that are on Openwall Distros
Policy:
xenproject.org/security-policy.html
Pre-disclosure list membership:
FOSS projects/distros: 7
Products based on Xen: 11
Public Service Providers/Large Users: 57
That is a large pre-disclosure list, but we didn’t have a single leakage since we
made the list inclusive 4 years ago
Allow updating of public
facing systems during
embargo
Openwall
Distros (Linux)
Xen Project OpenStack
Only in rare and
extreme cases
Not documented
Yes, unless
discoverer objects
Enables hosting and cloud providers to update
their systems during the pre-disclosure period
In addition, Xen allows pre-disclosure member to
make non-specific announcements to customers,
aka “please reboot X by date because of an
upcoming Xen Project security issue”
An open source project,
of which a commercial
variant is delivered to
a service provider
Template adapted from one designed by PresentationGO.com
Pre-disclosure does not
allow to inform customers
of the issue
Service providers, even
those using commercial
derivatives, qualify to be
on the pre-disclosure list
Template adapted from one designed by PresentationGO.com
Service provider
has capability to deploy
fixes under embargo
Pre-disclosure list
members are allowed
to securely share information,
including binaries
Service provider
has visibility and
can plan deployment
This is also useful for live
patching and back-ports
for releases out of security
support
Openwall Distros: unspecified
Openstack: 3-5 days
• Generally too short for deployment at scale
Xen Project: 2 weeks, usually in batches of several issues
• 2 weeks have proven to be enough time for most organizations to handle 5-6 issues in one go
(assumes live patching)
• The project is currently reviewing its security process:
see https://lists.xenproject.org/archives/html/xen-devel/2018-05/threads.html#01127 looking at
– Batching of Issues
– Workload batches have on consumers of security issues
– Making publication of security issues more predictable
Best Practice:
https://www.first.org/global/sigs/
vulnerability-coordination/multiparty/guidelines-v1.0
Security Disclosure between FOSS and vendors can be complex
– Most project’s have opaque practices: Linux Kernel, Qemu, Cloud Foundry, …
– There are exceptions: Linux Distros, Drupal, Mozilla, Node.js, OpenStack, Xen
Project
– Some standardization in the LF eco-system would be helpful
➜ across FOSS the range of different practices is even wider
– However this will be hard: it took the Xen Project 5 years of difficult iterative
public negotiations to get to where we are today
Multi-party Disclosure is even harder, but becoming more common
– Emerging standards and Best Practices amongst CSIRTs
– These promote NDAs amongst participating CSIRTs
(trust is insufficient if commercial stakes are high and there are legal risks)
➜ a problem for FOSS projects which cannot normally sign NDAs
Open Source Policies:
xenproject.org/security-policy.html
security.openstack.org/vmt-process.html
oss-security.openwall.org/wiki/mailing-lists/distros
Best Practice and Standards:
ISO/IEC29147 ➜ ISO/IEC DIS 29147
www.first.org
www.first.org/global/sigs/
vulnerability-coordination/multiparty/guidelines-v1.0
lars.kurth@xenproject.org
Picture by Lars Kurth

More Related Content

What's hot

Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Denim Group
 
Aqualink Week 6 H4D Stanford 2016
Aqualink Week 6 H4D Stanford 2016Aqualink Week 6 H4D Stanford 2016
Aqualink Week 6 H4D Stanford 2016Stanford University
 
Right of Boom Week 7 H4D Stanford 2016
Right of Boom Week 7 H4D Stanford 2016Right of Boom Week 7 H4D Stanford 2016
Right of Boom Week 7 H4D Stanford 2016Stanford University
 
Right of Boom Lessons Learned H4D Stanford 2016
Right of Boom Lessons Learned H4D Stanford 2016Right of Boom Lessons Learned H4D Stanford 2016
Right of Boom Lessons Learned H4D Stanford 2016Stanford University
 
Guardian Lessons Learned H4D Stanford 2016
Guardian Lessons Learned H4D Stanford 2016Guardian Lessons Learned H4D Stanford 2016
Guardian Lessons Learned H4D Stanford 2016Stanford University
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationBlack Duck by Synopsys
 
Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016Stanford University
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment TechniquesDenim Group
 

What's hot (8)

Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
 
Aqualink Week 6 H4D Stanford 2016
Aqualink Week 6 H4D Stanford 2016Aqualink Week 6 H4D Stanford 2016
Aqualink Week 6 H4D Stanford 2016
 
Right of Boom Week 7 H4D Stanford 2016
Right of Boom Week 7 H4D Stanford 2016Right of Boom Week 7 H4D Stanford 2016
Right of Boom Week 7 H4D Stanford 2016
 
Right of Boom Lessons Learned H4D Stanford 2016
Right of Boom Lessons Learned H4D Stanford 2016Right of Boom Lessons Learned H4D Stanford 2016
Right of Boom Lessons Learned H4D Stanford 2016
 
Guardian Lessons Learned H4D Stanford 2016
Guardian Lessons Learned H4D Stanford 2016Guardian Lessons Learned H4D Stanford 2016
Guardian Lessons Learned H4D Stanford 2016
 
Making the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network CommunicationMaking the Strategic Shift to Open Source at Fujitsu Network Communication
Making the Strategic Shift to Open Source at Fujitsu Network Communication
 
Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 

Similar to XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the scenes - Lars Kurth, Xen Project / Citrix

LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...
LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...
LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...The Linux Foundation
 
Sustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into SoftwareSustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into SoftwareSoftware Sustainability Institute
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017Atef Yassin
 
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Source Conference
 
What to Expect When You're Expecting (to Own Production)
What to Expect When You're Expecting (to Own Production)What to Expect When You're Expecting (to Own Production)
What to Expect When You're Expecting (to Own Production)Michael Diamant
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-SessionRyan Faircloth
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingAll Things Open
 
How to adapt the SDLC to the era of DevSecOps
How to adapt the SDLC to the era of DevSecOpsHow to adapt the SDLC to the era of DevSecOps
How to adapt the SDLC to the era of DevSecOpsZane Lackey
 
Release Management Description
Release Management DescriptionRelease Management Description
Release Management DescriptionDavid Stuart
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideAryan G
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsCheckmarx
 
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...OpenNebula Project
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application SecurityChristian Martorella
 
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.pptTaiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.pptgealehegn
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for DevopsJerika Phelps
 
T Jull - Product Development for Point-of-Care Testing Systems
T Jull - Product Development for Point-of-Care Testing SystemsT Jull - Product Development for Point-of-Care Testing Systems
T Jull - Product Development for Point-of-Care Testing SystemsThomas Jull
 
Security Patterns - An Introduction
Security Patterns - An IntroductionSecurity Patterns - An Introduction
Security Patterns - An IntroductionMarcel Winandy
 

Similar to XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the scenes - Lars Kurth, Xen Project / Citrix (20)

LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...
LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...
LinuxCon NA 2015:Are today's FOSS Security Practices Robust Enough in the Clo...
 
Sustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into SoftwareSustainability Training Workshop - Managing Sustainability into Software
Sustainability Training Workshop - Managing Sustainability into Software
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerab...
 
What to Expect When You're Expecting (to Own Production)
What to Expect When You're Expecting (to Own Production)What to Expect When You're Expecting (to Own Production)
What to Expect When You're Expecting (to Own Production)
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
Lab 10
Lab 10Lab 10
Lab 10
 
Open Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are usingOpen Source evaluation: A comprehensive guide on what you are using
Open Source evaluation: A comprehensive guide on what you are using
 
How to adapt the SDLC to the era of DevSecOps
How to adapt the SDLC to the era of DevSecOpsHow to adapt the SDLC to the era of DevSecOps
How to adapt the SDLC to the era of DevSecOps
 
Release Management Description
Release Management DescriptionRelease Management Description
Release Management Description
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference Guide
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
 
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
OpenNebulaConf2015 1.14 Are Today’s FOSS Security Practices Robust Enough in ...
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application Security
 
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.pptTaiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
T Jull - Product Development for Point-of-Care Testing Systems
T Jull - Product Development for Point-of-Care Testing SystemsT Jull - Product Development for Point-of-Care Testing Systems
T Jull - Product Development for Point-of-Care Testing Systems
 
Security Patterns - An Introduction
Security Patterns - An IntroductionSecurity Patterns - An Introduction
Security Patterns - An Introduction
 

More from The Linux Foundation

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleThe Linux Foundation
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...The Linux Foundation
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...The Linux Foundation
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...The Linux Foundation
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather ReportThe Linux Foundation
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...The Linux Foundation
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxThe Linux Foundation
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...The Linux Foundation
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderThe Linux Foundation
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...The Linux Foundation
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixThe Linux Foundation
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdThe Linux Foundation
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...The Linux Foundation
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DThe Linux Foundation
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsThe Linux Foundation
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...The Linux Foundation
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...The Linux Foundation
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...The Linux Foundation
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEThe Linux Foundation
 

More from The Linux Foundation (20)

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made Simple
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather Report
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
 

Recently uploaded

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 

XPDDS18: LCC18: Disclosure policies in the world of cloud - a look behind the scenes - Lars Kurth, Xen Project / Citrix

  • 1. Lars Kurth Community Manger, Xen Project Chairman, Xen Project Advisory Board Director, Open Source, Citrix lars_kurth
  • 2. Was a contributor to various projects Worked in parallel computing, tools, mobile and now virtualization Community guy for the Xen Project Working for Citrix Xen Project Community Manager Accountable to Xen Project Advisory Board Chairman of Xen Project Advisory Board Have worked on Xen Project’s security practices for 4+ years
  • 3.
  • 4. Template designed by PresentationGO.com Identify weak points of the target Reconnaissance Infiltrate & Maneuver Deliver targeted malware to vulnerable systems: map defences & weaknesses, create battle plan, deploy multiple parallel attack channels. Exfiltrate & Maintain Access Achieve the intended objective and back out leaving no trace Weaknesses enabling the lifecycle Vulnerabilities, Malware, Exploits, Rootkits. Social Engineering, …
  • 5. Vulnerability A weakness in the computational logic of software that, when exploited, results in a negative impact to confidentiality, integrity, OR availability of that software. Patch / Live Patch A fix for a security vulnerability. A live patch can be applied to a running system Known vulnerabilities with patches
  • 6. Malware Software designed to disrupt, damage, or gain authorized access to a computer system. Exploit Malware designed to take advantage of a vulnerability This includes file-less/memory based attack techniques (around 14% at end of 2016) 0-Day Exploit An exploit of an undisclosed/previously unknown vulnerability that is/has been exploited Rootkit Software tools that enable unauthorized users to gain control of a computer system without being detected, some for for a long period of time Some malware relies on social engineering: e.g. phishing, trojans, adware, …
  • 7. Reactive Services Proactive Services Security Quality Management Alerts and Warnings Incident Handling: analysis, response on site, response support, response coordination Vulnerability Handling: Vulnerability analysis, response, response coordination Artefact Handling: analysis, response, response coordination Announcements Technology Watch Security Audits or Assessments Configuration and Maintenance of Security Tools, Applications, and Infrastructures Development of Security Tools Intrusion Detection Services Security-Related Information Dissemination Vulnerability Bounty Programs Risk Analysis Business Continuity and Disaster Recovery Planning Security Consulting Awareness Building Education/Training Product Evaluation or Certification
  • 8. Products and Distros Ensure that a fix is available in all product variants that were affected by the vulnerability and ideally deployed by key customers at the time information of the security issue becomes public. Cloud Providers and other public facing services Ensure that a fix is deployed on all public facing hosts that were affected by the vulnerability at the time information of a security issue becomes public.
  • 9. Standard: ISO/IEC29147 ➜ ISO/IEC DIS 29147 https://www.first.org
  • 10. The overall process a CSIRT team goes through when they discover a vulnerability themselves or one is reported to them directly In this case we assume that the CSIRT team has full control over all components in their system, which is normally only the case when the Software stack is proprietary. The process an open source project’s CSIRT team goes through (modelled on best practice as used by openwall Distros and Linux distros, Xen Project and others) How a commercial CSIRT team interacts with an open source team and how this constrains what the commercial team can do
  • 11. Triage Vulnerability reported to organization Analysis of Issue Organizational / Planning Establish Impacted Releases / Customers Create PoC / Test Case: Understand the issue, investigate its impact, enable test that issue is fixed Impact assessment Negotiate Disclosure Schedule Draft issue description Plan deployment: large organizations need to make sure that staff across impacted teams is available Allocate CVE Number Issue description
  • 12. Triage Analysis of Issue Vulnerability reported to organization Organizational / Planning Development of Mitigation Live Patch Development Develop fix Q&A of fix (formal proof that fix addresses the exploit) Develop Live Patch Backport fix/live patch to affected products Per product validation
  • 13. Analysis of Issue Organizational / Planning Development of Mitigation Live Patch Development Deployment Disclosure Resource planning Packaging (bundling of several fixes) Q&A of packages against affected releases / customer types Deployment to affected customers Disclosure to impacted FOSS project (if applicable) Pre-disclosure to important customers typically under an NDA type agreement Publish Documentation Customer notification
  • 14. This model assumes that the managing CSIRT organization is only constrained by the wishes of the issue reporter – This gives such an organization the freedom to for example pre-disclose information to “important customers” – And a maximum of freedom on any implementation schedule, assuming it can convince the discoverer of an issue – The possibility to not disclose any issues publicly: aka quietly fix them When open source components are used, significant constraints are put on what the CSIRT team can do A similar situation also arises in situations where multiple parties are impacted (e.g. Spectre, Meltdown)
  • 15. Triage Vulnerability reported to FOSS organization Analysis of Issue Organizational / Planning Establish Impacted Releases Create Test Case: Understand the issue, investigate its impact, enable test that issue is fixed Impact assessment Negotiate Disclosure Schedule Draft issue description Plan deployment: large organizations need to make sure that staff across impacted teams is available Allocate CVE Number Issue description
  • 16. Triage Analysis of Issue Vulnerability reported to FOSS organization Organizational / Planning Development of Mitigation Develop fix Q&A of fix (formal proof that fix addresses the exploit) Develop Live Patch Backport fix/live patch to affected products Per product validation
  • 17. sue al / Planning of Mitigation Pre-Disclosure Pre-disclosure to qualifying downstream PSIRTS Typically fixed time-table (e.g. 2 weeks) Restricts what CSIRT can do (e.g. no deployment of fix during embargo) Collaboration between qualifying CSIRTs can be restricted
  • 18. sue al / Planning of Mitigation Pre-Disclosure Public Disclosure Publish Documentation and the fix Projects might use own channel Or openwall oss-security
  • 19. Products and Distros Ensure that a fix is available in all product variants that were affected by the vulnerability and ideally deployed by key customers at the time information of the security issue becomes public. Cloud Providers and other public facing services Ensure that a fix is deployed on all public facing hosts that were affected by the vulnerability at the time information of a security issue becomes public. Whether these goals are achievable, depends on the FOSS Vulnerability Management Process
  • 20. Pre-Disclosure Period Tr Vulnerabilities with fixes predisclosed to org Will usually perform triage, because OSS based product/service typically is modified (patch queue) and/or use an unusual configuration. May choose not to fix a lower severity issue immediately.
  • 21. Analysis of Issue Organizational / Planning Pre-Disclosure Period Tr Vulnerabilities with fixes predisclosed to org Verify Impacted Releases / Customers Create PoC / Test Case Own Impact Assessment (assessment typically depends on assumptions that are not always universal) Plan deployment: large organizations need to make sure that staff across impacted teams is available Product specific issue description
  • 22. Analysis of Issue Organizational / Planning Pre-Disclosure Period Tr Vulnerabilities with fixes predisclosed to org Adaptation of Mitigation Live Patch Development Adapt fix Q&A of fix in own environment (formal proof that fix addresses the exploit) Develop Live Patch Backport fix/live patch to affected products Per product validation
  • 23. Vulnerabilities with fixes predisclosed to org Analysis of Issue Organizational / Planning Pre-Disclosure Period Tr Packaging & DeploymentAdaptation of Mitigation Packaging (bundling of several fixes) Q&A of packages against affected releases / customer types Ready delivery channels for publication to affected customers (e.g. automatic deployment)
  • 24. Analysis of Issue Organizational / Planning Pre-Disclosure Period Tr Packaging & DeploymentAdaptation of Mitigation If deployment under embargo is permissible: • Update all hosts that are affected (typically using live patching) • In the past (and in theory in some cases today) some hosts may need to be rebooted ➜ in such cases, customers need to be notified during the embargo period and may need to take action Vulnerabilities with fixes predisclosed to org
  • 25. Does it qualify to be on a FOSS project’s pre-disclosure list? Timetable: • When is an issue pre-disclosed? • How many bugs are pre-disclosed at once? • How long is the disclosure period? What can be done: • Deployment under embargo? • Communicating to affected customers that they need to take action (e.g. scheduled reboots) • Collaboration with other pre-disclosure list members Technical: • FOSS projects may do less than the CSIRT would do normally • E.g. no live patches, no PoCs, no severity assessment, backports to older versions, …
  • 26. Orgs qualifying for pre-disclosure Openwall Distros (Linux) Xen Project OpenStack FOSS & Commercial Distros Commercial & FOSS Downstreams Distros, products, public services, large users This means that cloud and hosting providers generally do not know of Linux related security issues under pre-disclosure and cannot plan for, fix or deploy fixes until they become public Service Providers that are on Openwall Distros
  • 27. Policy: xenproject.org/security-policy.html Pre-disclosure list membership: FOSS projects/distros: 7 Products based on Xen: 11 Public Service Providers/Large Users: 57 That is a large pre-disclosure list, but we didn’t have a single leakage since we made the list inclusive 4 years ago
  • 28. Allow updating of public facing systems during embargo Openwall Distros (Linux) Xen Project OpenStack Only in rare and extreme cases Not documented Yes, unless discoverer objects Enables hosting and cloud providers to update their systems during the pre-disclosure period In addition, Xen allows pre-disclosure member to make non-specific announcements to customers, aka “please reboot X by date because of an upcoming Xen Project security issue”
  • 29. An open source project, of which a commercial variant is delivered to a service provider Template adapted from one designed by PresentationGO.com Pre-disclosure does not allow to inform customers of the issue
  • 30. Service providers, even those using commercial derivatives, qualify to be on the pre-disclosure list Template adapted from one designed by PresentationGO.com Service provider has capability to deploy fixes under embargo Pre-disclosure list members are allowed to securely share information, including binaries Service provider has visibility and can plan deployment This is also useful for live patching and back-ports for releases out of security support
  • 31. Openwall Distros: unspecified Openstack: 3-5 days • Generally too short for deployment at scale Xen Project: 2 weeks, usually in batches of several issues • 2 weeks have proven to be enough time for most organizations to handle 5-6 issues in one go (assumes live patching) • The project is currently reviewing its security process: see https://lists.xenproject.org/archives/html/xen-devel/2018-05/threads.html#01127 looking at – Batching of Issues – Workload batches have on consumers of security issues – Making publication of security issues more predictable
  • 33.
  • 34.
  • 35. Security Disclosure between FOSS and vendors can be complex – Most project’s have opaque practices: Linux Kernel, Qemu, Cloud Foundry, … – There are exceptions: Linux Distros, Drupal, Mozilla, Node.js, OpenStack, Xen Project – Some standardization in the LF eco-system would be helpful ➜ across FOSS the range of different practices is even wider – However this will be hard: it took the Xen Project 5 years of difficult iterative public negotiations to get to where we are today Multi-party Disclosure is even harder, but becoming more common – Emerging standards and Best Practices amongst CSIRTs – These promote NDAs amongst participating CSIRTs (trust is insufficient if commercial stakes are high and there are legal risks) ➜ a problem for FOSS projects which cannot normally sign NDAs
  • 36. Open Source Policies: xenproject.org/security-policy.html security.openstack.org/vmt-process.html oss-security.openwall.org/wiki/mailing-lists/distros Best Practice and Standards: ISO/IEC29147 ➜ ISO/IEC DIS 29147 www.first.org www.first.org/global/sigs/ vulnerability-coordination/multiparty/guidelines-v1.0