Summary
I hope you have taken this chapter to heart. We have covered a topic here that is often referred to as a dark art in security circles due to the complexities it creates. By that, I mean securing firmware and the boot process along with the digital signatures of your stack. I trust that this chapter has instilled a higher degree of understanding of how to configure boot-level securities. Finally, we have also touched upon the unseen and often untalked-about vulnerabilities that can exist in firmware. Through services like those now provided by Linux or via the NIST database, you can stay informed about threats as they are reported. Knowing is half the battle. In our next chapter, we’ll explore a new way of deploying a Linux appliance through immutable images.