YoVDO

Keeping Up with CVEs: Finding Needles in Haystacks - Practical Vulnerability Assessment

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Vulnerability Management Courses Kubernetes Courses Container Security Courses Security Automation Courses Release Engineering Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and solutions in vulnerability management for container images in this conference talk. Learn how vulnerability scanners work, their limitations, and practical approaches to assess product security beyond raw vulnerability numbers. Discover strategies for implementing effective vulnerability management using Kubernetes images as an example. Gain insights into reducing false positives, focusing on code execution paths, and creating automated processes for vulnerability detection. Understand the complexities of container images and how to balance security concerns with practical solutions that allow engineers to work efficiently.

Syllabus

Introduction
Welcome
Why is the graph looking like this
Example
Vulnerability Scanner
Vulnerability Analysis
Image Scanners
Vulnerability Impact
Kubernetes
Release Engineering
Kubernetes Enhancement Proposal
Distroless
Base
Bash Static
QProxy
Not a perfect solution
Container images are complex
Imperfect solutions have benefits
Reduce churn
Vulnerability detection
How Kubernetes maintainers feel
Focus on code execution path
Give engineers breathing space
Create a list of images
Automated jobs
Questions


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

AZ-500: Microsoft Azure Security Technologies (LA)
A Cloud Guru
Kubernetes Security
A Cloud Guru
Scenario Based Docker Security
A Cloud Guru
Scenario Based LXD/LXC Security
A Cloud Guru
Secure Container Host Operating System
A Cloud Guru