logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Frederick Kautz
2023-04-21

tldr - powered by Generative AI

The presentation discusses the importance of establishing trust in computer systems and processes, and challenges the concept of 'zero trust' by suggesting that it should be renamed to 'zero implicit trust' to make it explicit.
  • Understanding the context of a system is important in determining how much to spend on defending it and what the value of the thing being defended is
  • Establishing trust in the foundation of a system is crucial before building on top of it
  • Developing a framework for trust involves asking questions about what is being trusted and why, and what the consequences are if that trust is violated
  • The blast radius of an incident should be kept small to minimize the impact of a breach or failure
  • The concept of 'zero trust' should be renamed to 'zero implicit trust' to make it explicit that something is being trusted and to encourage proper analysis and risk assessment
Authors: Gal Cohen, Liav Yona
2023-04-21

tldr - powered by Generative AI

The presentation discusses the importance of secure secret management in Kubernetes and provides solutions for managing secrets in a more secure way.
  • Secrets are essential for applications to function properly, but cannot be stored in Version Control Systems
  • Kubernetes Secrets are the representation of secrets in Kubernetes
  • By default, Kubernetes Secrets are stored unencrypted in etcd
  • The Secret Store CSI Driver provides a more secure solution for managing secrets in Kubernetes
  • The Secret Store CSI Driver integrates seamlessly into code and ensures robust security and least privilege access
  • Other solutions for managing secrets in Kubernetes include Vault, environment variables, and Mozilla Subs
Authors: Justin Cormack, Toddy Mladenov
2023-04-21

tldr - powered by Generative AI

The presentation discusses the importance of standards in supply chain security and the ongoing efforts to incorporate transparency logs and metadata into software in the container ecosystem.
  • Verifying identity and large entities is important in supply chain actions
  • Working with the SKET project to build a transparency log and record identities and signatures
  • Incorporating additional metadata around supply chains, such as S-BOMs and SPGX, to have more fine-grained controls
  • Proposing a new sub-project of Notary to directly store TUF repository metadata in the registry
  • Seeing Notary projects as a home for a set of standards around supply chain security
Authors: Brad Geesaman, Ian Coldwater, Rory McCune, Duffie Cooley
2023-04-21

tldr - powered by Generative AI

The presentation discusses the potential vulnerabilities and limitations of image scanning and S-bomb generation tools in DevOps and cybersecurity, and suggests ways to improve their effectiveness and prevent malicious attacks.
  • Image scanning and S-bomb generation tools are sensitive to changes in metadata and the quality of the steps involved in building images, and inconsistent results can cause problems for organizations
  • Malicious actors can manipulate the results of these tools, causing downstream effects and potentially compromising security
  • To prevent attacks, tool makers should adopt a more adversarial approach and provide a more restrictive mode with detection coverage as the focus
  • Users of these tools should check for unusual behavior, validate inputs and processes, and consider their threat model when making policy decisions
  • Teams should work together to achieve larger goals and reduce toil
Authors: Diana Atanasova, Julius von Kohout
2023-04-21

tldr - powered by Generative AI

The presentation discusses security issues in Kubeflow pipelines and proposes solutions to address them.
  • Rootless containers can solve the issue of containers running as root, but there is a limitation in building OCI containers rootless
  • The controllers in Kubeflow pipelines run as cluster admin, which is a security risk
  • Namespace sharing can also be a security risk as collaborators gain access to service accounts
  • Solutions proposed include reducing the complexity of controllers and using reduced cluster roles
  • The presentation highlights the progress made in Kubeflow security, such as authentication and machine-to-machine authentication
Authors: Charlie Egan
2023-04-21

tldr - powered by Generative AI

The presentation discusses the Gatekeeper project, a customizable Kubernetes admission web hook that uses Opa engine to enforce policies and enhance governance in organizations.
  • Gatekeeper project is a customizable Kubernetes admission web hook that uses Opa engine to enforce policies and enhance governance in organizations
  • Gatekeeper is used to ensure that workloads deployed to Kubernetes clusters are compliant with governance and company policies
  • Google Anthos and Microsoft Azure have embedded Gatekeeper in their policy engines
  • Gatekeeper simplifies the process of building an admission web hook
  • Gatekeeper uses Opa engine to enforce policies and enhance governance
  • The presentation also discusses updates to Opa, including new built-in functions and upcoming features such as schema validation and a more user-friendly output for tests
Authors: Aditya Sirish A Yelgundhalli
2023-04-20

tldr - powered by Generative AI

The presentation discusses the use of the update framework (TUF) and the attestation framework (I10) in securing the software supply chain. It also introduces the witness project and its tools to simplify the creation and consumption of attestations.
  • TUF and I10 are complementary projects that can be used together to secure the software supply chain
  • TUF allows for the use of metadata to associate internal metadata with the artifact being distributed from the repository
  • I10 provides enhanced capabilities for layouts that allow for the verification of the software supply chain execution
  • Witness is a community-driven open source implementation of TUF that focuses on indoor attestations
  • Witness has developed tools such as the witness run action and the policy tool to simplify the creation and consumption of attestations
Authors: Ben Hirschberg
2023-04-20

tldr - powered by Generative AI

The presentation discusses an innovative approach to securing Kubernetes clusters using behavior analysis during continuous integration testing and generating native policies based on behavior. The focus is on leveraging continuous behavioral analysis to replace tedious manual policy definitions and the importance of native policies to enforce security policies directly within Kubernetes without relying on third-party tools.
  • Continuous behavioral analysis can replace manual policy definitions
  • Native policies allow for direct enforcement of security policies within Kubernetes
  • Hands-on practices for implementing this approach are covered
  • The presentation emphasizes the importance of leveraging innovative approaches to security in Kubernetes clusters
Authors: Barun Acharya
2023-04-20

Containers and Orchestrators are being rapidly adopted worldwide due to the advantages they provide but so has risen the cyber attacks on the same. With the rise in recent zero days there’s an ever more demanding need to enforce security in containers.Even with Static Analyzers in place which scan for known vulnerabilities, a new vulnerability can pop up anytime or you can be compromised at runtime which may end up in losses. We should try to reduce the attack surface as much as possible to reduce these unknown unknowns.This talk will be about how can one choose to be a minimalist about their workloads right from choosing the right node images to reducing dependencies in our containers and finally restricting minimizing risks at runtime. We will explore about Optimized Operating Systems, RBAC, Docker Slim, Network Policies, Security Context and tooling around Mandatory Access Control and how they can help you out on your path to become minimalist with your workloads to secure them.
Authors: David de Torres Huerta, Mirco De Zorzi
2023-04-20

tldr - powered by Generative AI

Defensive Monitoring in Kubernetes Clusters
  • Using metrics from Prometheus to detect anomalies in network traffic and CPU usage
  • Manipulating data from Kubernetes metrics to generate topology diagrams of the cluster
  • Using service-level metrics to create network topology diagrams
  • These techniques can be useful for detecting and investigating security breaches