Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
N notebook
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 3
    • Issues 3
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Packages & Registries
    • Packages & Registries
    • Container Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value Stream
  • Wiki
    • Wiki
  • Members
    • Members
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Mark Stevens
  • notebook
  • Wiki
  • tablet hardening

tablet hardening · Changes

Page history
mstevens created page: tablet hardening authored Mar 23, 2017 by Mark Stevens's avatar Mark Stevens
Show whitespace changes
Inline Side-by-side
Showing with 8 additions and 1 deletion
+8 -1
  • tablet-hardening.md tablet-hardening.md +8 -1
  • No files found.
tablet-hardening.md
View page @ 0d1ed1fd
......@@ -17,9 +17,16 @@ Apks deployed to tablets are managed through a package manifest delivered throug
+ Apk's in the manifest are securely downloaded and installed.
+ Apk's in the com.buzztime package space must be signed with the buzztime release keystore
Runtime validations :
Runtime validations and security measures:
+ Tablets do not enable ADB or USB modes at startup and only enable it if the tablet is associated with a site that is configured to allow it.
+ The Buzztime Core package declares special permissions which may be used by applications to require that Intent, Service and ContentProvider requests are made only by buzztime signed applications.
+ SSL HTTP client requests are configured to use TLS 1.2 and the allowed cipher list is pruned to remove all ciphers that have been identified as insecure.
+ on Halo+ Tablets
+ Device storage encryption is enabled and required
+ SELinux is enabled and run in enforcing mode
+ No security keys are present on devices until the it has been authenticated and encrypted.
+ Firmware updates must be signed by the same key as the original Firmware signature.
......
Clone repository
  • branch code plan
  • build and test configuration
  • build artifact versioning
  • build server instrumented testing
  • build server move
  • bzt16wifi02 releases
  • bzt18uxa02 releases
  • configuration settings and permissions
  • create a repo from cli in gitlab
  • engineering status
  • feature deployment
  • gitlab installation instructions
  • Home
  • ota update and deployment
  • qbert implementation
View All Pages