Securing Kubernetes Applications by Crafting Custom Seccomp Profiles
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the critical aspects of securing Kubernetes applications through custom seccomp profiles in this informative conference talk. Learn how to effectively create and maintain seccomp profiles for containerized applications, enhancing overall security. Discover techniques for collecting required syscalls manually and through advanced methods like eBPF and automatic audit log tracing. Examine the pros and cons of relying on automation in profile creation. Gain insights into developing multi-architecture profiles and leveraging in-cluster enhancements such as the Security Profiles Operator. Acquire valuable knowledge on implementing seccomp in Kubernetes environments to fortify your applications against potential security threats.
Syllabus
Securing Kubernetes Applications by Crafting Custom Seccomp Profiles - Sascha Grunert, Red Hat
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Fundamentals of Containers, Kubernetes, and Red Hat OpenShiftRed Hat via edX Configuration Management for Containerized Delivery
Microsoft via edX Getting Started with Google Kubernetes Engine - Español
Google Cloud via Coursera Getting Started with Google Kubernetes Engine - 日本語版
Google Cloud via Coursera Architecting with Google Kubernetes Engine: Foundations en Español
Google Cloud via Coursera