Generating Security Policies with eBPF - Hands-on Walkthrough
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore eBPF-based solutions for detecting and enforcing security events through Security Policy creation in this 33-minute conference talk from KubeCon + CloudNativeCon Europe 2023. Gain hands-on experience with existing tools and approaches for capturing various security events and generating Security Policies. Learn about the evolution from manual filtering of system calls using seccomp and seccomp-bpf to automated solutions like Inspektor Gadget and Red Hat's seccomp profiler. Discover how Tetragon extends security event capture beyond system calls to include binaries, sockets, file operations, capabilities, and namespaces. Through a live demonstration, understand how to leverage these tools, capture different security events, and automatically generate Security Policies. Leave with a comprehensive understanding of implementing optimal eBPF-based security tooling for your system.
Syllabus
You and Your Security Profiles; Generating Security Policies with the Help of eBPF
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Scenario Based LXD/LXC SecurityA Cloud Guru Scenario Based Docker Security
A Cloud Guru Using Seccomp to Limit the Kernel Attack Surface
Linux Foundation via YouTube Trace Me if You Can - Bypassing Linux Syscall Tracing
Black Hat via YouTube Sandboxing Based on SECCOMP for Linux Kernel
Ekoparty Security Conference via YouTube