YoVDO

Using eBPF Superpowers to Generate Kubernetes Security Policies

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses eBPF Courses Inspektor Gadget Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the power of eBPF in generating Kubernetes security policies in this 40-minute conference talk from KubeCon + CloudNativeCon Europe 2023. Dive into the challenges of defining security mechanisms for Kubernetes applications, including network policies, seccomp profiles, and security contexts. Learn about innovative eBPF-based tools like Inspektor Gadget, Kubernetes Security Profiles Operator, and oci-seccomp-bpf-hook that can automatically generate these policies by monitoring application events. Discover the limitations of this approach, future developments in the field, and methods for auditing applications to ensure compliance with security policies. Gain valuable insights from Microsoft experts Mauricio Vásquez Bernal and Alban Crequy on enhancing Kubernetes security through automated policy generation.

Syllabus

Using the EBPF Superpowers To Generate Kubernetes Security... Mauricio Vásquez Bernal & Alban Crequy


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Debug Your Clusters with eBPF-Powered Tools
CNCF [Cloud Native Computing Foundation] via YouTube
Generating Security Policies with eBPF - Hands-on Walkthrough
CNCF [Cloud Native Computing Foundation] via YouTube
Klustered: eBPF Edition - Debugging Kubernetes with Advanced Tools
CNCF [Cloud Native Computing Foundation] via YouTube
Pod Security as an Afterthought
CNCF [Cloud Native Computing Foundation] via YouTube
Seccomp Security Profiles and You - A Practical Guide
CNCF [Cloud Native Computing Foundation] via YouTube