We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Public clouds and vulnerable CPUs: are we secure?

Formal Metadata

Title
Public clouds and vulnerable CPUs: are we secure?
Title of Series
Number of Parts
490
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
A whole bunch of CPU vulnerabilities were revealed in the past few years: Meltdown and Spectre, SSB, L1TF and MDS -- and there's little hope that we've seen them all. Every time there is a new vulnerability released, big cloud provides on day 1 claim that their hosts were updated and that their users are secure. Is this so or do we also need to do something inside our Linux guests to mitigate these vulnerabilities? And, do we have the required tools to actually do the mitigations? Are all of them enabled by default or not? And, if not, why? In the talk I'll try to answer these questions. The talk will cover recently discovered CPU vulnerabilities starting with Meltdown and Spectre. I will go through them and try to highlight 'public cloud specifics': what has/can to be done in the infrastructure of the cloud and what has/can be done inside Linux guests depending on the desired level of security and usage patterns.