Protect Containerized Applications with System Call Profiling
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore container security through system call profiling in this 53-minute conference talk from AppSecUSA 2016. Dive into the differences between containers and virtual machines, understanding the unique security challenges posed by shared OS kernels. Learn how to develop accurate system call profiles using static analysis of container images and host system knowledge. Discover techniques for runtime monitoring and protection against malicious behavior with minimal performance overhead. Follow along as the speaker demonstrates system call profiling on a sample micro-service application, showcasing its effectiveness in detecting behavioral anomalies with low false positives. Gain insights into practical considerations, challenges, and the value of this non-intrusive approach for hardening and isolating containerized applications.
Syllabus
Introduction
Agenda
What is Container
Container vs VMS
Darker
Darker Hub
Security Challenges
AppArmor
Circum
Container Threat Model
Assumptions
Remote Attacks
Container Attacks
Container Characteristics
Darken File
Console Log
RightToLog
Demo
Key Control System Call
Performance Hit
Performance Hit 2
Application Types
Static Analysis
Challenges
Practical Considerations
Value of Twister
Questions
Taught by
OWASP Foundation
Related Courses
Fundamentals of Containers, Kubernetes, and Red Hat OpenShiftRed Hat via edX Configuration Management for Containerized Delivery
Microsoft via edX Getting Started with Google Kubernetes Engine - Español
Google Cloud via Coursera Getting Started with Google Kubernetes Engine - 日本語版
Google Cloud via Coursera Architecting with Google Kubernetes Engine: Foundations en Español
Google Cloud via Coursera