X-Git-Url: https://gerrit.automotivelinux.org/gerrit/gitweb?a=blobdiff_plain;f=docs%2F2_Architecture_Guides%2F2_Security_Blueprint%2F0_Overview.md;fp=docs%2F2_Architecture_Guides%2F2.2_Security_Blueprint%2F0_Introduction%2FIntroduction.md;h=ee5e7f7e00252a30e6865d4b06ea2cb5ab3949ec;hb=65bd017e8b8f9a06008266de46303c88a9ac51c8;hp=b4ccf371435758c2ee4bdff10269e5184a7f8d39;hpb=7d32dd28e9b9fa97dd43bed13fb3050eb7ff8b3d;p=AGL%2Fdocumentation.git diff --git a/docs/2_Architecture_Guides/2.2_Security_Blueprint/0_Introduction/Introduction.md b/docs/2_Architecture_Guides/2_Security_Blueprint/0_Overview.md similarity index 96% rename from docs/2_Architecture_Guides/2.2_Security_Blueprint/0_Introduction/Introduction.md rename to docs/2_Architecture_Guides/2_Security_Blueprint/0_Overview.md index b4ccf37..ee5e7f7 100644 --- a/docs/2_Architecture_Guides/2.2_Security_Blueprint/0_Introduction/Introduction.md +++ b/docs/2_Architecture_Guides/2_Security_Blueprint/0_Overview.md @@ -1,9 +1,7 @@ --- -title: Introduction +title: Overview --- -# Introduction - Modern cars have become a lot more technologically sophisticated and different than those of the past. We are seeing a wider range of new features and functionality, with a lot more complex software. It is fair to say that the cars @@ -39,25 +37,6 @@ _Hardware_ and _Connectivity_ because this is not supported at our level. Solutions of connectivity problems concern updates and secured settings while hardware securing is related to the manufacturers. -The document is filled with tags to easily identify important points: - - - -- The _config_ tag quickly identifies the configurations and the recommendations - to take. - - - -- The _note_ tag allows you to notify some additional details. - - - -- The _todo_ tag shows the possible improvements. - - - -In annexes of this document, you can find all the _config_ and _todo_ notes. - ## Adversaries Adversaries and attackers within the Automotive space. @@ -184,14 +163,12 @@ control unit (**ECU**) or other managed devices. The target for all hardening activities is to prevent the execution of invalid binaries on the device, and to prevent copying of security related data from the device. - - ## AGL security overview AGL roots are based on security concepts. Those concepts are implemented by the security framework as shown in this picture: -![AGL architecture](WhiteBoxArchi.png) +![AGL architecture](images/WhiteBoxArchi.png) -------------------------------------------------------------------------------- @@ -206,8 +183,6 @@ The following table lists the strongest terms utilized within all this document. -------------------------------------------------------------------------------- - - # References - [security-blueprint](http://docs.automotivelinux.org/docs/architecture/en/dev/reference/security/01-overview.html).