Delivering Securely Connected, Updateable Systems

J. Pearson
Lynx Software Technologies, California, United States

Keywords: Cybersecurity, Linux, Certification, Threat Mitigation

The complexity of systems continues to rise with connectivity, AI, and decision making all at the edge of advanced security. Linux is one solution that can help given the broad developer base, pace of innovation and availability of application software. For example, the fifth-generation fighter aircrafts are historically unavailable for third-party software integration, but the US Air Force built and flight-tested their new Open Systems Enclave, which proved that it can rapidly integrate new technologies from code to flight in < 60 days, in first in-flight use of open-source container orchestration software on any fighter aircraft. This approach does expose the system to new cybersecurity threats though so in tandem with the benefits of Linux, Lynx and RunSafe will outline the vulnerability it has for valuable system information and risk for potentially modifying system behavior. Connected systems must be designed with a Defense-in-Depth approach that assumes outer perimeters will be breached and the inner components must be able to defend themselves. This session can review techniques for the effortless addition to these systems to raise the immunity of a Linux-based system from cyber attack and define a system architecture that can minimize the impact of a compromised system.