X-Git-Url: https://gerrit.automotivelinux.org/gerrit/gitweb?a=blobdiff_plain;f=docs%2F2_Architecture_Guides%2F2_Security_Blueprint%2F6_Application.md;fp=docs%2F2_Architecture_Guides%2F2.2_Security_Blueprint%2F6_Application%2F1.2.6.0_Abstract.md;h=c08d06ee136e6240482b0dd738a6397539c09521;hb=65bd017e8b8f9a06008266de46303c88a9ac51c8;hp=2925efbaebc4315431114c2a4e8a3ff53cc7e228;hpb=7d32dd28e9b9fa97dd43bed13fb3050eb7ff8b3d;p=AGL%2Fdocumentation.git diff --git a/docs/2_Architecture_Guides/2.2_Security_Blueprint/6_Application/1.2.6.0_Abstract.md b/docs/2_Architecture_Guides/2_Security_Blueprint/6_Application.md similarity index 72% rename from docs/2_Architecture_Guides/2.2_Security_Blueprint/6_Application/1.2.6.0_Abstract.md rename to docs/2_Architecture_Guides/2_Security_Blueprint/6_Application.md index 2925efb..c08d06e 100644 --- a/docs/2_Architecture_Guides/2.2_Security_Blueprint/6_Application/1.2.6.0_Abstract.md +++ b/docs/2_Architecture_Guides/2_Security_Blueprint/6_Application.md @@ -1,11 +1,7 @@ --- -title: Introduction +title: Application --- -# Part 6 - Application - -## Abstract - **Application Hardening**: Best practices to apply to the build and release of user space applications, in order to reduce the number of attack surfaces used by potential attackers. @@ -55,7 +51,7 @@ distributor, and platform level store distributor. AGL may define a different number of third parties, but at a minimum an author and store distributor should be defined. -![App Signing Flow](App_signing_flow.png) +![App Signing Flow](images/App_signing_flow.png) Once the number of signatures has been established, verification of those signatures needs to be done at a minimum at installation time on the AGL device. @@ -87,3 +83,43 @@ _LSM_ | **L**inux **S**ecurity **M**odule _MITM_ | **M**an **I**n **T**he **M**iddle _OSI_ | **O**pen **S**ystems **I**nterconnection _SATS_ | **S**tatic **A**pplication **S**ecurity **T**esting + +# Local + +Domain | Improvement +-------------------------- | ------------------------------ +Application-Installation-1 | Talk about AppFw offline mode. + +## Installation + +Applications can be delivered and installed with the base image using a special +offline-mode provided by the **AppFw**. Apps can also be installed at run time. + +During early release, default Apps are installed on the image at first boot. + +Domain | Object | Recommendations +-------------------------- | --------- | ----------------------------------------------------------------------- +Application-Installation-1 | AppFw | Provide offline-mode in order to install app with the base image. +Application-Installation-2 | Integrity | Allow the installation of applications only if their integrity is good. + +# Local + +## Privilege Management + +Application privileges are managed by **Cynara** and the security manager in the +**AppFw**. For more details, please refer to the **AppFw** documentation in +Platform part. + +# App Signature + +Domain | Improvement +----------------------- | ---------------------------------------------------------- +Application-Signature-1 | Add content (see secure build in Secure development part). + + +# Services + +Domain | Improvement +---------------------- | ------------ +Application-Services-1 | Add content (Which services?). +Application-Services-2 | Add Binder. \ No newline at end of file