summaryrefslogtreecommitdiffhomepage
path: root/website/content/_posts
diff options
context:
space:
mode:
Diffstat (limited to 'website/content/_posts')
-rw-r--r--website/content/_posts/2019-11-18-security-basics-figure1.pngbin19088 -> 0 bytes
-rw-r--r--website/content/_posts/2019-11-18-security-basics-figure2.pngbin17642 -> 0 bytes
-rw-r--r--website/content/_posts/2019-11-18-security-basics-figure3.pngbin16471 -> 0 bytes
-rw-r--r--website/content/_posts/2019-11-18-security-basics.md12
4 files changed, 7 insertions, 5 deletions
diff --git a/website/content/_posts/2019-11-18-security-basics-figure1.png b/website/content/_posts/2019-11-18-security-basics-figure1.png
deleted file mode 100644
index 2a8134a7a..000000000
--- a/website/content/_posts/2019-11-18-security-basics-figure1.png
+++ /dev/null
Binary files differ
diff --git a/website/content/_posts/2019-11-18-security-basics-figure2.png b/website/content/_posts/2019-11-18-security-basics-figure2.png
deleted file mode 100644
index f8b416e1d..000000000
--- a/website/content/_posts/2019-11-18-security-basics-figure2.png
+++ /dev/null
Binary files differ
diff --git a/website/content/_posts/2019-11-18-security-basics-figure3.png b/website/content/_posts/2019-11-18-security-basics-figure3.png
deleted file mode 100644
index 833e3e2b5..000000000
--- a/website/content/_posts/2019-11-18-security-basics-figure3.png
+++ /dev/null
Binary files differ
diff --git a/website/content/_posts/2019-11-18-security-basics.md b/website/content/_posts/2019-11-18-security-basics.md
index ef2e9a37e..10a3ac0a7 100644
--- a/website/content/_posts/2019-11-18-security-basics.md
+++ b/website/content/_posts/2019-11-18-security-basics.md
@@ -1,8 +1,10 @@
---
title: gVisor Security Basics - Part 1
layout: post
-author: jsprad, zkoopmans
-permlink: /blog/:title/
+authors:
+- jsprad
+- zkoopmans
+permalink: /blog/2019/11/18/gvisor-security-basics-part-1/
---
# Part 1 - Introduction
@@ -87,7 +89,7 @@ Least-Privilege is applied throughout gVisor. Each component and more importantl
----
-![Figure 2](./2019-11-18-security-basics-figure2.png)
+![Figure 2](/assets/images/2019-11-18-security-basics-figure2.png)
Figure 2: runsc components and their privileges.
@@ -136,11 +138,11 @@ So, of the 350 syscalls in the Linux kernel, the Sentry needs to implement only
----
-![Figure 3](./2019-11-18-security-basics-figure3.png)
+![Figure 3](/assets/images/2019-11-18-security-basics-figure3.png)
Figure 3: Reduction of Attack Surface of the Syscall Table. Note that the Senty's Syscall Emulation Layer keeps the Containerized Process from ever calling the Host OS.
----
+----
## Secure-by-default