best-practices-badge icon indicating copy to clipboard operation
best-practices-badge copied to clipboard

Create separate entries for some hardening mechanisms

Open david-a-wheeler opened this issue 8 years ago • 2 comments

Review Ubuntu's Security Features to look for potential criterion questions. It might be useful to phrase at least some of these as separate criteria if #650 is implemented.

Credit: Credit goes to Matthew "Matt" Van Gundy, Cisco.

david-a-wheeler avatar Feb 21 '17 18:02 david-a-wheeler

I've readed the Ubuntu Security Features wiki pages. IMHO, "Security features of Ubuntu" and "kernel hardening options" are not suitable for general open source projects. But the Userspace Hardening methods (look like gcc security parameters for compilation and linkage) may become potential criteria for projects implemented in C/C++.

wanganyv avatar Mar 09 '17 08:03 wanganyv

Some less common hardening that might deserve mention can include:

  • documented interoperability with MAC systems (e.g. SELinux, AppArmor)
  • usage of sandboxing and syscall-filtering mechanisms (seccomp, landlock, pledge/unveil, capsicum)
  • compatibility with aggressive toolchain hardening (e.g. fstack-protector-all, fcf-protection=full, Clang features like CFI-sanitation, shadow call stacks, auto-var-init, etc)
  • tested to work on systems with strict enforcement of policies like W^X, full ASLR and PIE-only execution.

Seirdy avatar Sep 28 '21 06:09 Seirdy