Real-Time Vulnerability Management with Kyverno & KubeArmor by Barun Acharya @KubeArmor [English]

preview_player
Показать описание
Event Name: Secure-i-ous Solutions: Secret to Cloud Native Security
Event Date: October 19, 2024
Location: Microsoft, Gurugram

For more info, visit the following:

Speaker: Barun Acharya

Speaker Description:
Barun Acharya is a software engineer by profession and an open-source enthusiast at heart. He currently serves as a maintainer and leads the development efforts for KubeArmor, a CNCF Sandbox project, while working as a Software Engineer at Accuknox. Passionate about low-level systems and developer tooling, Barun loves exploring the depths of open source, cloud-native technologies, and security.

A proud CNCF Ambassador, Barun frequently speaks at conferences, sharing his insights on open-source projects and cloud-native security. He is also actively involved in mentoring through programs like Google Summer of Code and LFX Mentorship, contributing to the growth of the open-source community.

Session Description:
In this session, we will explore how organizations can go beyond traditional security best practices, such as using Admission Controllers like Kyverno and Static Analysis tools, to protect against emerging vulnerabilities. While effective, these measures may not always safeguard applications against newly discovered threats. Since application upgrades can take time, it can be more practical to sandbox these vulnerabilities rather than wait for upstream fixes. We will dive into the concept of virtual patching—an approach to contain and prevent the exploitation of vulnerabilities at runtime without affecting application behaviour or deployment processes, thereby preventing downtime. Session Highlights:
1. Addressing Future Vulnerabilities: Learn why static analysis and admission controls may fall short in protecting against new threats.
2. Virtual Patching: Understand how virtual patching can help contain vulnerabilities without impacting applications.
3. Live Demonstrations: Explore real-world examples using well-known vulnerabilities, such as Log4j, PwnKit, xz, and Leaky Vessels.
4. Kyverno and KubeArmor Integration: See how to use Kyverno to identify vulnerable workloads, leverage image vulnerability scanners, and create KubeArmor policies for applying virtual patches, ensuring robust security without operational disruption.

Follow Barun Acharya on Social Media:

Follow CNCG New Delhi on Social Media:
Рекомендации по теме