YoVDO

Seccomp Security Profiles and You - A Practical Guide

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Conference Talks Courses Application Security Courses Inspektor Gadget Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the practical application of seccomp security profiles and Linux Capabilities in this 28-minute conference talk by Duffie Cooley from VMware. Gain insights into tools designed to simplify the process of determining necessary syscalls for application hardening. Learn about Dockersl.im, an open-source project that produces smaller images with derived seccomp security profiles, and Inspektor Gadget, which uses BPF to inspect pod activities. Discover how these tools can enhance visibility into syscall and filesystem access, making security profile implementation more approachable for developers and system administrators.

Syllabus

Seccomp Security Profiles and You: A Practical Guide - Duffie Cooley, VMware


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Using eBPF Superpowers to Generate Kubernetes Security Policies
CNCF [Cloud Native Computing Foundation] via YouTube
Debug Your Clusters with eBPF-Powered Tools
CNCF [Cloud Native Computing Foundation] via YouTube
Generating Security Policies with eBPF - Hands-on Walkthrough
CNCF [Cloud Native Computing Foundation] via YouTube
Klustered: eBPF Edition - Debugging Kubernetes with Advanced Tools
CNCF [Cloud Native Computing Foundation] via YouTube
Pod Security as an Afterthought
CNCF [Cloud Native Computing Foundation] via YouTube