YoVDO

Protect Containerized Applications with System Call Profiling

Offered By: OWASP Foundation via YouTube

Tags

Container Security Courses Microservices Courses Application Security Courses Containerization Courses Threat Modeling Courses Static Analysis Courses AppArmor Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore container security through system call profiling in this 53-minute conference talk from AppSecUSA 2016. Dive into the differences between containers and virtual machines, understanding the unique security challenges posed by shared OS kernels. Learn how to develop accurate system call profiles using static analysis of container images and host system knowledge. Discover techniques for runtime monitoring and protection against malicious behavior with minimal performance overhead. Follow along as the speaker demonstrates system call profiling on a sample micro-service application, showcasing its effectiveness in detecting behavioral anomalies with low false positives. Gain insights into practical considerations, challenges, and the value of this non-intrusive approach for hardening and isolating containerized applications.

Syllabus

Introduction
Agenda
What is Container
Container vs VMS
Darker
Darker Hub
Security Challenges
AppArmor
Circum
Container Threat Model
Assumptions
Remote Attacks
Container Attacks
Container Characteristics
Darken File
Console Log
RightToLog
Demo
Key Control System Call
Performance Hit
Performance Hit 2
Application Types
Static Analysis
Challenges
Practical Considerations
Value of Twister
Questions


Taught by

OWASP Foundation

Related Courses

AZ-500: Microsoft Azure Security Technologies (LA)
A Cloud Guru
Kubernetes Security
A Cloud Guru
Scenario Based Docker Security
A Cloud Guru
Scenario Based LXD/LXC Security
A Cloud Guru
Secure Container Host Operating System
A Cloud Guru