We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Public clouds and vulnerable CPUs: are we secure?

Formale Metadaten

Titel
Public clouds and vulnerable CPUs: are we secure?
Serientitel
Anzahl der Teile
490
Autor
Lizenz
CC-Namensnennung 2.0 Belgien:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
A whole bunch of CPU vulnerabilities were revealed in the past few years: Meltdown and Spectre, SSB, L1TF and MDS -- and there's little hope that we've seen them all. Every time there is a new vulnerability released, big cloud provides on day 1 claim that their hosts were updated and that their users are secure. Is this so or do we also need to do something inside our Linux guests to mitigate these vulnerabilities? And, do we have the required tools to actually do the mitigations? Are all of them enabled by default or not? And, if not, why? In the talk I'll try to answer these questions. The talk will cover recently discovered CPU vulnerabilities starting with Meltdown and Spectre. I will go through them and try to highlight 'public cloud specifics': what has/can to be done in the infrastructure of the cloud and what has/can be done inside Linux guests depending on the desired level of security and usage patterns.