YoVDO

Securing Kubernetes Applications by Crafting Custom Seccomp Profiles

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Seccomp Courses Kubernetes Courses Containerization Courses Container Security Courses Cloud-Native Security Courses eBPF Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of securing Kubernetes applications through custom seccomp profiles in this informative conference talk. Learn how to effectively create and maintain seccomp profiles for containerized applications, enhancing overall security. Discover techniques for collecting required syscalls manually and through advanced methods like eBPF and automatic audit log tracing. Examine the pros and cons of relying on automation in profile creation. Gain insights into developing multi-architecture profiles and leveraging in-cluster enhancements such as the Security Profiles Operator. Acquire valuable knowledge on implementing seccomp in Kubernetes environments to fortify your applications against potential security threats.

Syllabus

Securing Kubernetes Applications by Crafting Custom Seccomp Profiles - Sascha Grunert, Red Hat


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Scenario Based LXD/LXC Security
A Cloud Guru
Scenario Based Docker Security
A Cloud Guru
Using Seccomp to Limit the Kernel Attack Surface
Linux Foundation via YouTube
Trace Me if You Can - Bypassing Linux Syscall Tracing
Black Hat via YouTube
Sandboxing Based on SECCOMP for Linux Kernel
Ekoparty Security Conference via YouTube