logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Adrian Mouat
2022-10-24

tldr - powered by Generative AI

The talk discusses techniques and tooling to address security concerns in building images for the secure supply chain.
  • Provenance and reproducibility are major issues in the current state of security in IT.
  • The distroless philosophy and using smaller base images can save from scan report purgatory.
  • Updating images and dependencies is crucial.
  • Using apko to build container images with SBOMs and complete reproducibility.
  • Signing images with Sigstore.
  • Cutting down dependencies by using smaller base images and keeping them up to date.
  • Verifying signatures and using policy management tools to check for vulnerabilities.
  • The vulnerability exploitability exchange can help filter vulnerabilities and cut down noise.
  • Google container tools and digital images are small and perfect for running statically compiled binaries.
  • The drawbacks of using Google container tools include a hard-to-extend list and difficulty in installing apps.
  • Cutting down images to the minimum set of dependencies can drastically reduce noise in vulnerability reports.