Embedded Linux Security

The ELinOS Security approach is simple yet powerful: Keep it small and focused. Running fewer services and libraries reduces the system’s attack surface, lowering risks from malware, viruses, and other cyber threats. That’s why ELinOS uses a unique method to configure both kernel and user space simultaneously, tailored precisely to your target device’s needs.

ELinOS Embedded Linux

Most Linux distributions include many applications and libraries for maximum flexibility, but many of these are often unused. ELinOS takes a different path: Its automatic library dependency resolver ensures only the necessary libraries for selected programs—whether built-in or custom—are included.

Unlike typical Linux distributions, ELinOS does not enable unnecessary services like HTTP or SSH servers by default. Instead, these remain optional, resulting in a custom, lean, and highly secure embedded system.

Additionally, ELinOS supports all Linux standard Security mechanisms to harden an embedded system such as user privilege separation, read-only file system, kernel memory protection and Address Space Layout Randomization (ASLR).

SYSGO Blog

ELinOS and the Cyber Resilience Act (CRA)

Read more

Security on Embedded Targets that run Guest OSs

Embedded Linux ELinOS can run as a so-called partition on an embedded target that is separated in time and space from its host operating system. PikeOS as host system ensures that its guest operating systems don’t access resources that aren't allocated. Only predefined memory and I/O spaces can be controlled in ELinOS.

On top of embedded Linux ELinOS Security approach, its host operating system encapsulates the Linux system in a way that attackers can’t break out of the shell. Interrupt control is managed by the host operating system PikeOS - ELinOS can’t access the hardware independently. This mechanism also applies to the Memory Management Unit (MMU).

Please accept functional cookies to watch this video.

Immutable Linux — Secure by Design

An immutable filesystem helps protect your embedded Linux system by preventing unauthorized changes at runtime, ensuring system integrity and simplifying updates.

Watch this quick demo to see how to set up an immutable Linux root filesystem in ELinOS using CODEO — our integrated development environment. This video guides you through the essential steps to build a tamper-resistant system.

Immutable Linux with ELinOS

Download the Whitepaper

ELinOS Security Services

ELinOS Security services is an optional offer for our customers. It allows ELinOS customers to improve and maintain the Security of their ELinOS systems by receiving regular customized Security advisories about newly identified Security issues and early access to updated software packages.

Project Consulting

We identify potential Security issues in third party software components supplied with ELinOS. This includes monitoring services such as the coverage of the Common Vulnerabilities and Exposures (CVE) list and also Security advisories by open-source community. We deliver impact analyses and the identification of potential Security issues as well as regular Security fixes in a quarterly time frame.

Customer Benefits

Check

Proactive Security Maintenance

Continuous monitoring, rapid patching, and timely Security updates ensure your system stays protected against evolving threats

Check

Hardened Linux Kernel & Immutable Filesystem

ELinOS is built with security best practices, including a hardened kernel, strict access controls, secure boot, and an immutable filesystem that prevents unauthorized runtime changes—enhancing system integrity and resilience

Check

Secure Development Life Cycle

Our processes integrate Security from design to deployment, helping you meet compliance and regulatory requirements

Check

Long-Term Support & Vulnerability Management

Benefit from extended support with proactive vulnerability tracking and mitigation tailored to your embedded platform

Check

Tailored Security for your Use Case

Flexible configurations allow balancing Security needs with performance and resource constraints

Need more Information?

Tell us about your project and your needs.
 

Contact us