Cloud Native Computing Foundation / Cloud Native Security Day 2019 (San Diego)

Add meeting Rate page Subscribe

Cloud Native Computing Foundation / Cloud Native Security Day 2019 (San Diego)

These are all the meetings we have in "Cloud Native Securit…" (part of the organization "Cloud Native Computi…"). Click into individual meeting pages to watch the recording and search or read the transcript.

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

Continuous Assurance and Continuous Compliance via Data, Graph, Query and Code - Erkang Zheng, LifeOmic

Attackers see your digital environment in 3D. They know time is on their side because most vulnerabilities will have to be stumbled upon. For organizations to level the playing field, they need to move from viewing their environment linearly, in two dimensions, to three. To do that, tools need to change. The way data and relationships are mapped needs to change. A graph, not a checklist, is the only way to represent this complexity in a meaningful way. See how LifeOmic streamlines their DevOps process using a graph data model as augmented intelligence to achieve data-driven, automated security operations in the cloud. We’ll share our strategy doing a minimum of 20 deploys/week through a continuous security/compliance approach. View it as ‘compliance as code’.
  • 5 participants
  • 29 minutes
compliance
auditing
omec
regulation
manage
monitoring
safeguards
assessors
jupiter
okay
youtube image

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

IBM Sponsored Session - Protecting Kubernetes Workloads from Attacks - Chris Rosen, IBM

Innovation and speed require cloud tools to build, deploy, and run cloud-native workloads. But how do I protect those workloads and mitigate the risks of running those apps in the cloud? This demo showcases how you can easily isolate Kubernetes clusters to ensure outbound Internet traffic is routed through in-cluster virtual firewalls to protect your resources and intellectual property.
  • 1 participant
  • 6 minutes
deployments
operational
developer
managed
workloads
busy
datacenter
modernization
kubernetes
tweak
youtube image

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

MLGuard -- Detecting Malicious Web Requests using a Serverless-based Machine Learning System - Abhinav Srivastava, Frame.io

Web Application Firewall (WAF) blocks incoming web requests using a variety of signatures such as SQL injection, Cross-Site Scripting, and Bots. Proactively identifying and blocking bad requests, which avoid exhibiting the known malicious patterns, is both challenging and essential from security operations perspective. In this talk, I will describe a serverless-based end-to-end system called MLGuard that ingests AWS load-balancers log data, creates a machine-learning model (Isolation Forest) with the frequency distribution of cumulative HTTP response code using Amazon SageMaker, invokes the model using the HTTP API to detect unusual requests, and sends alerts to Slack for the security team to block IPs. MLGuard utilizes various Serverless technologies such as Function-as-a-Service, DynamoDb, and API Gateway, and since its deployment a year ago, it has helped block thousands of bad IPs.
  • 1 participant
  • 28 minutes
iot
mio
bots
supervised
security
important
platform
frame
video
dot
youtube image

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

Open Spaces

Open Spaces provides the community an opportunity to discuss what topics matter to them most. Unlike the rest of the Cloud Native Security Day agenda, the Open Spaces agenda will be set by the attendees. Attendees will propose topics throughout the morning, and then attendees will vote on topics during lunch. After topics are set, attendees will break into 4-5 small groups to discuss the selected topics for 25 minutes. Each group will discuss a different topic, and attendees can float between each group as they see fit. For each group there should be a scribe that takes notes during the discussion. After 25 minutes, we will rotate topics and start the small group discussions again. At the end of Open Spaces we will reconvene as a group, and briefly share any takeaways from the discussion. For more details on the Open Space concept, you can read the Wikipedia article.
  • 5 participants
  • 5 minutes
discussion
conversations
enjoyed
security
community
listening
open
kubernetes
going
space
youtube image

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

Welcome Remarks
  • 1 participant
  • 11 minutes
morning
volunteers
conversation
hosting
conferences
sessions
quorum
staff
ready
schedule
youtube image

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

Palo Alto Networks Sponsored Session - How to Choose Which Cloud Native Technologies Work Best for Specific Workloads - John Morello, Palo Alto Networks

As containers gain mainstream momentum, the cloud-native ecosystem is experiencing rapid growth of new technologies and projects that are spinning off and expanding from the initial core of containers. One particularly intense area of innovation is in workload deployment/management. There are many options in the cloud-native environment and the differences between these technologies are often small and nuanced. This makes it challenging to understand the benefits and tradeoffs between them. It’s helpful to think of the technologies being placed on a continuum. The continuum starts with bare metal and VMs on the left, continue into "light" hypervisors (like Canonical's LXD), and extends into containers and services like AWS Fargate and then, ultimately, serverless. Technologies to the left provide the most isolation and control with the tradeoff of greater management and performance overhead. Those to the right facilitate more agile development and app density with the tradeoff of less control. In this talk, John Morello, VP of Product for Prisma by Palo Alto Networks, will demonstrate the continuum model, to address different scenarios and efficiently choose what technologies (or combination of technologies) work best for running different workloads.

This session will cover:
How each cloud-native technology will address different workload scenarios.
How to choose which technology (or combination of technologies) is best for running different workloads.
The characteristics each cloud-native technology offers as it relates to isolation, compatibility and control, and the distinctions between each.
  • 2 participants
  • 2 minutes
twistlock
cto
cn
security
server
alright
community
suggestions
customers
docker
youtube image

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

Slowing Our Role: Moving Towards Policy at Plex - John Reese, Plex Systems

In this talk, we'll walk through Plex's journey from role-based access to embracing policy.

To be fair, roles got us far at Plex. Roles can be a completely valid solution, especially for smaller systems. However, as we grew, we knew roles would not be able to solve all of our problems forever. Our solution? Policy.

Through policy, automation and autonomy became a reality. By defining policies upfront, we could include them in our environments and release processes, allowing for changes to be made without any human intervention. Policy also allowed us to focus on what we actually want to secure: data. Developers no longer have to concern themselves with permissions or roles and can just use the APIs they need to get their job done.

Our journey is not over yet, but you can still come hear all about where we started with role-based access control, where we are today, and where we want to be.
  • 4 participants
  • 26 minutes
policies
deploying
role
managers
security
responsibility
privileges
maintainer
service
users
youtube image

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

Sysdig Sponsored Session
  • 2 participants
  • 8 minutes
falco
kubernetes
security
fi
host
observability
platform
functionality
machine
information
youtube image

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

The Devil in the Details: Kubernetes’ First Security Assessment - Jay Beale, InGuardians & Aaron Small, Google

In October of last year, the Kubernetes project created a new Security Audit working group and began Kubernetes’ first comprehensive third-party security assessment. In the months that followed, we worked closely with Trail of Bits and Atredis Partners to assess and improve Kubernetes’ security posture. Through code review and penetration testing, we found and addressed 37 new vulnerabilities. With support from many Kubernetes contributors, the third party security firms and Kubernetes project produced a formal threat model covering eight critical components across six different trust zones. In this talk, we will share our findings, methodology, and vision for future security investments. We’ll discuss what the work uncovered, and what this means to Kubernetes security both now and for the future.
  • 5 participants
  • 36 minutes
kubernetes
discusses
security
adversary
committee
eventually
gke
craig
cto
cern
youtube image

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

The Path Less Traveled: Abusing Kubernetes Defaults - Duffie Cooley, VMware & Ian Coldwater, Heroku

While the industry and the community are starting to pay attention to Kubernetes security, there are many attack paths that aren’t well-documented, and are rarely discussed. This lack of information can make your clusters vulnerable.

In this live demonstration-filled talk, we are going to provide an overview of the Kubernetes control plane before using sigs.k8s.io/kind to show some of the attack surface exposed by a default configuration of Kubernetes. There will be multiple exploits involving various moving parts, including cluster takeovers and host escapes. We’ll show you mitigations, and then show you how to get around those.

The audience will walk away from this talk with a better understanding of Kubernetes’ default attack surface, how it can be exploited, and how to keep their clusters safer.
  • 2 participants
  • 28 minutes
kubernetes
security
default
network
cluster
policies
exposing
hosts
hacking
vmware
youtube image

3 Dec 2019

Join us for Kubernetes Forums Bengaluru and Delhi - learn more at kubecon.io

Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects

Trusted Software Supply Chain with JTE - Steven Terrana, Booz Allen Hamilton

DevOps was all about getting application developers and operations engineers to work together more effectively. In large part, automated testing and infrastructure as code enabled repeatable deployments we could be confident would work in production. Unfortunately, bottlenecks frequently arose in the software delivery process because the security team was never pulled into the fold. Enter DevSecOps. In this talk, we’ll cover how to integrate security into every step of the software development lifecycle to build a trusted software supply chain to production and how the Jenkins Templating Engine can accelerate the adoption of these practices at scale in your organization.
  • 1 participant
  • 29 minutes
devops
security
deployments
dedsec
ops
policies
developers
systems
important
consulting
youtube image