logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Brad Geesaman, Ian Coldwater, Rory McCune, Duffie Cooley
2023-04-21

tldr - powered by Generative AI

The presentation discusses the potential vulnerabilities and limitations of image scanning and S-bomb generation tools in DevOps and cybersecurity, and suggests ways to improve their effectiveness and prevent malicious attacks.
  • Image scanning and S-bomb generation tools are sensitive to changes in metadata and the quality of the steps involved in building images, and inconsistent results can cause problems for organizations
  • Malicious actors can manipulate the results of these tools, causing downstream effects and potentially compromising security
  • To prevent attacks, tool makers should adopt a more adversarial approach and provide a more restrictive mode with detection coverage as the focus
  • Users of these tools should check for unusual behavior, validate inputs and processes, and consider their threat model when making policy decisions
  • Teams should work together to achieve larger goals and reduce toil
Authors: Yan Wang, Vadim Bauer
2023-04-20

tldr - powered by Generative AI

Harbor is an open-source registry for managing Cloud native artifacts in a Kubernetes environment. It offers multi-tenancy, policy enforcement, replication, and security features.
  • Harbor is a trusted Cloud native repository for Kubernetes
  • It offers multi-tenancy and row-based access control for flexible user permissions
  • Policy enforcement includes caller creation, retention policy, and immutability
  • Replication and process cache allow for artifact distribution
  • Security and compliance are core features with identity access management and P2P capabilities
Authors: Ethan Lowman
2023-04-20

tldr - powered by Generative AI

Datadog's unique approach to image signing and verification at scale in a Kubernetes environment
  • Image signing and verification is crucial for securing the software supply chain and ensuring the integrity of container images
  • Datadog's engineering teams use a wide variety of languages and CI/CD configurations, constantly deploying images to tens of thousands of nodes across dozens of Kubernetes clusters, spanning multiple cloud providers and datacenters
  • To ease adoption and maintenance of image signing across heterogenous build environments, Datadog takes a service-oriented approach, encapsulating cryptographic complexity within a gRPC signing service
  • To verify image signatures at runtime, Datadog uses an image verification plugin system contributed upstream to containerd, instead of using Kubernetes admission controllers
  • Datadog's approach balances the need for fast developer feedback and better security properties
  • Datadog's approach improves performance and reliability by diverting most of the registry load to the read path and avoiding introducing new cluster-level dependencies
Authors: Daojun Zhang, Yan Wang, Chenyu Zhang, Vadim Bauer
2022-10-26

tldr - powered by Generative AI

Harbor is an open source cloud-native registry project that stores, manages, signs, and scans content to solve common OCI artifact management challenges. The presentation covers advanced features of Harbor such as OCI artifact management in cloud environments, management of artifacts and their attachments, recommended settings for high concurrent use, and high availability deployments. The team also seeks feedback from users and contributors on current features and future roadmap.
  • Harbor is a trusted cloud-native registry that can store, sign, and scan content
  • Harbor supports any OCI-compatible artifacts
  • Harbor provides advanced features such as OCI artifact management in cloud environments, management of artifacts and their attachments, recommended settings for high concurrent use, and high availability deployments
  • Harbor is highly customizable and can be monitored using Prometheus
  • Harbor will deliver system-level robot accounts in addition to project-level robot accounts
  • Harbor is an open-source project with a thriving community
Authors: Mritunjay Sharma, Shuting Zhao, Ruhika Bulani
2022-10-25

tldr - powered by Generative AI

The panel discussion focuses on the intersection of Kyverno and DockerSlim in making Kubernetes workloads more secure.
  • Containers have become the norm as cloud adoption increases sharply.
  • Developers face challenges in making containers production-ready and secure.
  • Kyverno and DockerSlim are two projects that address these challenges.
  • Kyverno provides policies that act as a contract for shared environments like Kubernetes.
  • DockerSlim helps in minifying container images and automating the creation of AppArmor and SecComp profiles.
  • The combination of Kyverno and DockerSlim makes cluster security management easier and more efficient.
Conference:  ContainerCon 2022
Authors: Brandon Mitchell
2022-06-21

tldr - powered by Generative AI

The presentation discusses the benefits of using OCI-compliant images in DevOps and cybersecurity practices.
  • OCI-compliant images offer more portability and plug-and-play capabilities in the DevOps ecosystem
  • The end goal is to have a more efficient, modular, and secure system
  • OCI is a good packaging format for shipping and storing data, but not for querying vulnerabilities
  • Annotations and attestations are important metadata for auditing and security purposes
  • Image signing should include the final name of the repository
Authors: Steve Lasker
2022-05-19

tldr - powered by Generative AI

Best practices for managing and consuming public content and software in DevOps and cybersecurity
  • Keep a copy of the software and supply chain artifacts as close as possible to the deployment location
  • Automate builds and testing, and generate new supply chain artifacts
  • Scan and patch all deployed software, even if it's archived for compliance
  • Associate S-bombs and other claims with software versions in the registry
  • Add annotations to improve information over time
Authors: Pablo Galego
2022-05-19

tldr - powered by Generative AI

The presentation discusses the importance of vulnerability scanning in DevOps and provides tips for refining the output of vulnerability scanning tools.
  • Vulnerability scanning is important in DevOps
  • Refining the output of vulnerability scanning tools is necessary for efficient use
  • Tools like 3b have flags that can be used to filter results
  • Mitigating reported vulnerabilities is often an easy task
  • An anecdote is provided to illustrate the process of refining vulnerability scanning output
Authors: Natalie Arellano, Sambhav Kothari
2022-05-19

Cloud Native Buildpacks makes building container images a breeze. It comes with out-of-the-box support for rebasing, reproducibility, multiple entrypoints and more! In this talk we’ll uncover the magic that the lifecycle - the binary at the heart of CNB - uses to convert source code into OCI images.Click here to view captioning/translation in the MeetingPlay platform!
Authors: Daojun Zhang, Yan Wang, Chenyu Zhang, Vadim Bauer
2022-05-18

tldr - powered by Generative AI

Harbor is an open-source cloud native registry project that resolves image and Helm Chart management challenges. The presentation covers advanced features of Harbor, such as image signature management, image management in a cloud environment, unified management of Helm chart and container images, and highly-available deployments. The team also seeks feedback from users and contributors on current features and future roadmap.
  • Harbor is an open-source cloud native registry project that resolves image and Helm Chart management challenges
  • Advanced features of Harbor include image signature management, image management in a cloud environment, unified management of Helm chart and container images, and highly-available deployments
  • The team seeks feedback from users and contributors on current features and future roadmap