+ All Categories
Home > Technology > BKK16-200K2 Standards and Security

BKK16-200K2 Standards and Security

Date post: 14-Feb-2017
Category:
Upload: linaro
View: 428 times
Download: 0 times
Share this document with a friend
36
Standards and Security Matthew Garrett Security Developer at CoreOS <[email protected]>
Transcript
Page 1: BKK16-200K2 Standards and Security

Standards and SecurityMatthew Garrett

Security Developer at CoreOS<[email protected]>

Page 2: BKK16-200K2 Standards and Security

Computers are everywhere

Page 3: BKK16-200K2 Standards and Security

Laptops

Page 4: BKK16-200K2 Standards and Security

Phones

Page 5: BKK16-200K2 Standards and Security

Cars

Page 6: BKK16-200K2 Standards and Security

Light bulbs

Page 7: BKK16-200K2 Standards and Security

We generate more data than ever before

Page 8: BKK16-200K2 Standards and Security

We place more trust in the systems around us

Page 9: BKK16-200K2 Standards and Security

Our duty is to ensure that that trust is well-placed

Page 10: BKK16-200K2 Standards and Security

We're failing

Page 11: BKK16-200K2 Standards and Security

(badly)

Page 12: BKK16-200K2 Standards and Security

A story about lightbulbs

Page 13: BKK16-200K2 Standards and Security

A story about Barbie

Page 14: BKK16-200K2 Standards and Security

The challenges are not new

Page 15: BKK16-200K2 Standards and Security

We are here because we value collaboration

Page 16: BKK16-200K2 Standards and Security

So why do we keep reinventing security?

Page 17: BKK16-200K2 Standards and Security

Innovative security usually isn't

Page 18: BKK16-200K2 Standards and Security

What should this look like?

Page 19: BKK16-200K2 Standards and Security

Define best practices

Page 20: BKK16-200K2 Standards and Security

Write a reference implementation

Page 21: BKK16-200K2 Standards and Security

Provide guarantees to higher layers

Page 22: BKK16-200K2 Standards and Security

Industry-wide organisation

Page 23: BKK16-200K2 Standards and Security

Meaningful public review

Page 24: BKK16-200K2 Standards and Security

UEFI

Page 25: BKK16-200K2 Standards and Security

TCG

Page 26: BKK16-200K2 Standards and Security

Do not differentiate on fundamental security

Page 27: BKK16-200K2 Standards and Security

(but what about the children?)

Page 28: BKK16-200K2 Standards and Security

This is a rapidly developing industry

Page 29: BKK16-200K2 Standards and Security

Product iteration is rapid

Page 30: BKK16-200K2 Standards and Security

Time on market is short

Page 31: BKK16-200K2 Standards and Security

Lifetime of devices doesn't match support cycles

Page 32: BKK16-200K2 Standards and Security

Immutable security is bad security

Page 33: BKK16-200K2 Standards and Security

What should our legacy be?

Page 34: BKK16-200K2 Standards and Security

The era of ubiquitous information?

Page 35: BKK16-200K2 Standards and Security

The era of ubiquitous insecurity?

Page 36: BKK16-200K2 Standards and Security

Let's make some good choices


Recommended