Book Image

Learning Embedded Linux Using the Yocto Project

By : Alexandru Vaduva, Vaduva Jan Alexandru
Book Image

Learning Embedded Linux Using the Yocto Project

By: Alexandru Vaduva, Vaduva Jan Alexandru

Overview of this book

Table of Contents (20 chapters)
Learning Embedded Linux Using the Yocto Project
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
8
Hob, Toaster, and Autobuilder
9
Wic and Other Tools
Index

Meta-security and meta-selinux


In this section, the layer initiatives related to the security tools of Linux are presented. In this chapter, two layers that provide both security and hardening tools are available for the Linux kernel and its libraries. Their purpose is to simplify mode embedded devices, make sure that they're secure, and maybe offer the security level similar to a desktop.

Since embedded devices have become increasingly competent and powerful, concerns related to security can only be natural. The Yocto Project's initiative layers, here, I am referring to meta-security and meta-selinux, take another step in simplifying the process to ensure secure, hardened, and protected Linux systems. Together, with the detect and fix vulnerability system, they are implemented inside the security team, and help with the ideal of having the same level of security on embedded devices as desktops, along with taking this idea a step further. Having said this, let's proceed to the actual explanation...