logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: James Cleverley-Prance, Fabian Kammel
2023-04-21

tldr - powered by Generative AI

The presentation discusses the importance of threat modeling and demonstrates common attacks and defensive techniques against Kubernetes clusters and workloads.
  • Threat modeling is important to identify and address security risks in a system before it goes into production.
  • The Microsoft threat matrix for Kubernetes is a useful resource for identifying tactics and entry points an attacker could use and the mitigations to prevent them.
  • The presentation demonstrates six exploit scenarios, including leveraging a compromised container, exploiting RBAC misconfigurations, and hijacking the entire cluster.
  • For each scenario, the impact of the attack is discussed, and controls and mitigation strategies are presented.
  • The presentation concludes with a summary of the lessons learned.
Authors: Greg Castle, Vinayak Goyal
2023-04-21

tldr - powered by Generative AI

The presentation discusses the importance of running containers as non-root for improved security and provides strategies for migrating to non-root containers.
  • Running containers as non-root provides significant security benefits
  • Migrating to non-root containers can be done through a programmatic approach
  • Stateless containers are easier to migrate than those with volume mounts
  • The host users feature in Kubernetes makes it easier to run containers as non-root
  • There are vulnerabilities in the Linux kernel that can be exploited to break out of containers
  • The presentation offers a demo of running an nginx container as non-root
Authors: Barun Acharya
2022-10-26

tldr - powered by Generative AI

Cube armor is a cloud native runtime security enforcement system that provides fine-grained access control on container entities, with a declarative way to manage policies for access control, inline policy enforcement, and Telemetry data with context.
  • Cube armor provides fine-grained access control on container entities
  • Cube armor offers a declarative way to manage policies for access control
  • Cube armor has inline policy enforcement
  • Cube armor provides Telemetry data with context
Authors: Andrew Martin
2022-10-26

tldr - powered by Generative AI

The presentation discusses the importance of threat modeling and supply chain security in DevOps and provides best practices for securing the supply chain.
  • Threat modeling is important to bring quantifiability and reason to abstract threats and to identify attack paths.
  • The Stride process and standards documents can be used to exhaust potential permutations of threats and identify simple controls to cover as many cases as possible.
  • The attack tree is a visual representation of an attack and can be used to multiply likelihood and impact to give abstract risk scores.
  • Layering controls across the branches of the attack tree can break the attack chain and provide a minimum viable set of security configurations.
  • Pipeline metadata is important for piecing things back together and giving a different type of observation.
  • Best practices for securing the supply chain include using S-bombs, artifact signing, and evidence leaks and ledgers.
  • Measuring SAL level and mean time to remediation are useful indicators of vendor maturity.
  • Retrofitting and slowly maturing the supply chain is important.
  • Asking vendors for S-bombs is a closer first step than asking for SAL level.
Authors: Ayse Kaya
2022-10-24

tldr - powered by Generative AI

The talk discusses the evolution of vulnerabilities in popular public container images and the challenges faced by developers and DevSecOps teams in handling them. The speaker shares insights from a report on publicly available containers on Docker Hub and highlights the need for practical steps to prevent the dev process from grinding to a halt.
  • Container scanning and security is becoming more widely adopted, but the long-term security posture of containers is not well-understood.
  • New vulnerabilities arise constantly, and many vulnerabilities fall into a catchall bucket of 'won't fix'.
  • The attack surface of popular public container images like Python and NodeJS has changed over the past year, and different vulnerability scanners show different results.
  • Developers and DevSecOps teams face challenges in ensuring containerized applications are free from vulnerabilities due to the complexity of containers and manual processes.
  • Practical steps can be taken to stay on top of vulnerabilities and prevent the dev process from grinding to a halt.
Conference:  ContainerCon 2022
Authors: Aviv Sasson
2022-06-22

Containers are glorified by the fact that no one can escape them, and frankly - escaping containers is a tricky and complex task that is impossible in most scenarios. Many security layers restrict the container in order to prevent an escape. But what are those layers? How do they work? What are their defaults? Can we modify them? Should we? This session will present the Linux kernel features and mechanisms that make up those layers, including Capabilities, Seccomp, SELinux, and AppArmor. It will discuss how container runtimes implement them to create a security stack that keeps the container tamed and whether if it is possible to modify them for specific use cases while explaining the security risks of such actions.