Vulnerability Exploitation In Docker Container Environments

preview_player
Показать описание
by Anthony Bettini

According to Forrester, 53% of IT respondents say their biggest concern about containers is security. Containerization is not only prevalent in browsers (Google Chrome), desktop applications (Adobe Reader X), and mobile operating systems (Apple iOS), but is also invading the data center via Docker. Docker and other LXC-based containerization solutions provide isolation via Linux control groups (cgroups). However, containers can still be exploited and even with kernel-level isolation, critical data can be stolen. In this presentation, the FlawCheck team will exploit real-world Docker implementations and show what can be done to mitigate the risk.
Рекомендации по теме
Комментарии
Автор

Audio is screwed from mid way in onwards. It's bad.

taylorlawson
Автор

So sad, the audio goes crap, this was an excellent talk.

token