logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Katrina Verey
2023-04-21

tldr - powered by Generative AI

The presentation discusses the design principles and implementation of a new system for managing configuration and deployment of applications. The system aims to strike a balance between exposing changes and ensuring meaningful review, while also accommodating the needs of a wide range of users.
  • The system was designed with the goal of making it easy for developers to get started and ensuring commonly needed changes would be simple to make
  • The system includes a config CLI and API, a version schema, and a customization system
  • The config CLI provides a familiar interactive workflow for developers to modify production configuration
  • The config API simplifies the user experience by explicitly encoding the main application properties that developers need to control
  • The version schema allows for formal versioning and evolution of the system over time
  • The customization system allows for advanced users to leverage the full power of Kubernetes APIs when needed
  • The system strikes a balance between exposing changes and ensuring meaningful review, while also accommodating the needs of a wide range of users
Authors: Shane Lawrence, Daniele Santos
2023-04-21

tldr - powered by Generative AI

The presentation discusses the importance of identifying and preventing common misconfigurations in Kubernetes workloads to avoid cyber attacks and data breaches. The speakers demonstrate how to use Kubeaudit, an open source scanner, to detect and mitigate configuration risks without adding undue friction for developers.
  • Misconfigured settings, insecure defaults, and overly permissive controls are common causes of cyber attacks and data breaches
  • Kubeaudit is an open source scanner that provides a user-friendly way to detect and automatically mitigate configuration risks
  • Challenges of securing 1,000,000 running pods along with configuration files in a GitHub org with 15,000 repos are discussed
  • Attendees learn how to detect and resolve configuration issues without needing expert knowledge while keeping developers happy
Authors: Ann Wallace, Zeal Somani
2022-05-19

tldr - powered by Generative AI

The presentation discusses the concept of continuous compliance and how it can be applied to DevSecOps programs. The Open Security Controls Assessment Language (OSCAL) and OSS like Falco and Voucher are presented as tools to achieve continuous compliance at scale.
  • Traditional compliance is manual and stressful
  • Continuous compliance can be achieved through automated control-based assessments
  • OSCAL can be used to create these assessments
  • OSS like Falco and Voucher can be used to achieve continuous compliance at scale
  • Real-time communication and feedback loops are important for successful implementation of continuous compliance