The TRENTOS Training

This one-week course introduces the fundamental aspects of TRENTOS, a novel seL4®-based secure embedded operating system developed by HENSOLDT Cyber.  The course is split in a lecture part, which covers the theoretical background including the basic aspects of seL4 and CAmkES, and a practical part that provides a basic case in order to teach participants how to create their very first TRENTOS application.

HENSOLDT Cyber’s TRENTOS training has received interim endorsement as seL4 training by the seL4 Foundation.

Training by Sebastian Eckl

Learn the professional and solid handling of seL4 from Sebastian Eckl. He worked as a research assistant at TUM before joining HENSOLDT Cyber where he focused on teaching L4 microkernel-based operating systems for several years. At the TUM Chair of Operating Systems, led by Prof. Baumgarten, he is currently working on his doctoral thesis dealing with migration-supported dynamic reconfiguration in distributed embedded real-time systems. Thereby he acquired a profound expertise in seL4 and TRENTOS.

TRENTOS

TRENTOS is a seL4® based operating system. With the Trusted Entity Operating System (TRENTOS), HENSOLDT Cyber provides secure IT from the bottom up, by building upon the mathematically proved seL4 microkernel and its software ecosystem and trusted open-source components. With the TRENTOS SDK, HENSOLDT Cyber provides a complete development environment that equips a developer with all the tools required for building, testing and deploying TRENTOS-based systems to the real world. The SDK contains the actual operating system (OS) source code, consisting of seL4, CAmkES and TRENTOS, but also offers a collection of additional resources designed to make developer’s work easier by increasing efficiency and reducing complexity.

For more information about TRENTOS, visit our blog

Register Now

Simply register with your preferred start date

  •  

Consultancy

When it comes to an estimation of security consultancy in most systems, there are several questions which cannot be answered in detail upfront. In order to ensure an approach which is appropriate for a specific customer, HENSOLDT Cyber offers consultancy as a two stage process. This significantly reduces the financial risk of the customer that the IT consultancy extends the targeted goal for a specific product or system. Reason for that risk is that IT-Security is a vast field in which different solutions are appropriate for different customers, those solutions addressing different attack vectors which may be regarded or not. The protection means for said vectors significantly influences the necessary level of consultancy in the technical area

Stage 1 – System Introduction / Identification of IT-Security need

In stage 1, HENSOLDT Cyber creates an overview of the system, listing relevant applied technologies and specifying how these are interconnected.
Those technologies typically are:

  • Hardware platform(s)
  • Operating systems(s)
  • Software component(s)
  • Cryptographic algorithm(s) / implementation(s)
  • Communication protocol(s)
  • Internal system communication
  • External interface(s)
  • External interface(s) to world wide web
  • Already applied IT-security mechanisms (e.g. TPMs, Firewalls, etc…)
  •  

Possible attack vectors throughout the supply chain (see figure below) are identified by Hensoldt Cyber and discussed with the customer, creating a list of attacks and associated risks from the customer’s point of view.

The result of this stage is a list of attack vectors including a recommendation which of them shall be addressed in the further system/product development.

Stage 2 – Extending System Design with IT-Security Aspect

Based on a well understood system design and attack vectors which shall be addressed, recommendations for means to protect against those attacks shall be identified. Those recommendations shall be, in discussion with the customer, added to the system design. Possible impacts on the design shall be identified in
regards to

  • System performance
  • Processes covering the whole product lifecycle
  • Organizational aspects
  • Financial aspects (based on recommended solutions)
  • Safety aspects (if appropriate)
  • Certification aspects (if appropriate)
  •  

This stage typically involves different experts on customer side leading to a detailed update of the system design covering all necessary aspects.
At the end of this stage, a detailed updated system design for the customer is available, upon which explicit decisions can be taken. Those decisions typically are done under consideration of the benefit of addressed attack vectors and the impacts on functional system design in addition to financial aspects. The updated system design does not mandatory include solutions from Hensoldt cyber but alternative suppliers as well.