YoVDO

Container Attack Surface Reduction Beyond Name Space Isolation

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses DevOps Courses Container Security Courses Binary Analysis Courses

Course Description

Overview

Explore container security vulnerabilities and attack surface reduction techniques in this 50-minute Black Hat conference talk. Analyze findings from a study of the top 100 official Docker images on DockerHub, revealing thousands of vulnerabilities and misconfigurations. Discover how these security issues often stem from unnecessary dependencies, binaries, and improper file/user/network permissions rather than the core application. Learn strategies for reducing container attack surfaces that go beyond traditional namespace isolation. Gain insights from security experts Azzedine Benameur, Jay Chien-An Chen, Lei Ding, and Michalis Polychronakis on improving container security practices.

Syllabus

Container Attack Surface Reduction Beyond Name Space Isolation


Taught by

Black Hat

Related Courses

Maintaining Deployment Security in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning
Securing Containers and Kubernetes Ecosystem
LinkedIn Learning
Performing DevSecOps Automated Security Testing
Pluralsight