YoVDO

Generating Security Policies with eBPF - Hands-on Walkthrough

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

eBPF Courses Kubernetes Courses System Calls Courses Security Policies Courses Container Security Courses Seccomp Courses Cloud-Native Security Courses Inspektor Gadget Courses Tetragon Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore eBPF-based solutions for detecting and enforcing security events through Security Policy creation in this 33-minute conference talk from KubeCon + CloudNativeCon Europe 2023. Gain hands-on experience with existing tools and approaches for capturing various security events and generating Security Policies. Learn about the evolution from manual filtering of system calls using seccomp and seccomp-bpf to automated solutions like Inspektor Gadget and Red Hat's seccomp profiler. Discover how Tetragon extends security event capture beyond system calls to include binaries, sockets, file operations, capabilities, and namespaces. Through a live demonstration, understand how to leverage these tools, capture different security events, and automatically generate Security Policies. Leave with a comprehensive understanding of implementing optimal eBPF-based security tooling for your system.

Syllabus

You and Your Security Profiles; Generating Security Policies with the Help of eBPF


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Using eBPF Superpowers to Generate Kubernetes Security Policies
CNCF [Cloud Native Computing Foundation] via YouTube
Debug Your Clusters with eBPF-Powered Tools
CNCF [Cloud Native Computing Foundation] via YouTube
Klustered: eBPF Edition - Debugging Kubernetes with Advanced Tools
CNCF [Cloud Native Computing Foundation] via YouTube
Pod Security as an Afterthought
CNCF [Cloud Native Computing Foundation] via YouTube
Seccomp Security Profiles and You - A Practical Guide
CNCF [Cloud Native Computing Foundation] via YouTube