Re: Enabling SELinux in an application #selinux
Rudolf J Streif
There is no simply answer to your question. Most generally
speaking any type of security, not just for computers and embedded
systems, is a tradeoff between risk and cost.
The fact that your appliances have USB ports and are potentially connected to the Internet makes them vulnerable for attacks. They can potentially be used to gain access to your appliances, put malicious software on them, potentially damage them. be used as bots for cyber attacks, etc. An expert and embedded security can assess the risk by examining your appliances, software etc. You only can assess the risk for your business and the business of your customers. What will it mean for a customer and your business if multiple appliances are hacked and not functioning anymore and the customer cannot deliver their product and services possibly for days until you are able to reinstall the software? What does that mean for your business if that happens at many of your customers' locations at the same time?
It does not need to be professional hackers that are out for financial gain doing that. Your proverbial 16 year old kid operating the equipment could be an aspiring embedded systems engineer who is curious about what's behind the scenes of the appliances.
It's never a bad idea to think about security for your embedded systems. Having done a whole lot deal of embedded systems in automotive and explicitly for securing content and devices for digital television I can only advise you to take it seriously. It's better to be proactive then reactive. Bad embedded systems security practices are all around. Just because your vendors have not done it does not really mean anything.
SELinux is only one consideration. There are other things that go into hardening an embedded system.
On 4/21/20 11:50 AM, Cguerin@... wrote:
-- ----- Rudolf J Streif CEO/CTO ibeeto +1.855.442.3386 x700