Securing Kubernetes Applications by Crafting Custom Seccomp Profiles
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the critical aspects of securing Kubernetes applications through custom seccomp profiles in this informative conference talk. Learn how to effectively create and maintain seccomp profiles for containerized applications, enhancing overall security. Discover techniques for collecting required syscalls manually and through advanced methods like eBPF and automatic audit log tracing. Examine the pros and cons of relying on automation in profile creation. Gain insights into developing multi-architecture profiles and leveraging in-cluster enhancements such as the Security Profiles Operator. Acquire valuable knowledge on implementing seccomp in Kubernetes environments to fortify your applications against potential security threats.
Syllabus
Securing Kubernetes Applications by Crafting Custom Seccomp Profiles - Sascha Grunert, Red Hat
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Scenario Based LXD/LXC SecurityA Cloud Guru Scenario Based Docker Security
A Cloud Guru Using Seccomp to Limit the Kernel Attack Surface
Linux Foundation via YouTube Trace Me if You Can - Bypassing Linux Syscall Tracing
Black Hat via YouTube Sandboxing Based on SECCOMP for Linux Kernel
Ekoparty Security Conference via YouTube