Top Security Talks from KubeCon Europe 2023

KubeCon Europe is the largest open-source community conference in Europe with hundreds of talks. We picked our favorite Kubernetes security sessions available online.

2 분 읽기

KubeCon + CloudNativeCon Europe 2023 took place last week in Amsterdam with over 10,000 attendees, nearly 280 sessions, and multiple keynote speeches. All the conference’s videos have been released on YouTube.

Here are some of our favorite KubeCon 2023 talks:

Can You Keep a Secret? on Secret Management in Kubernetes – Every production application today utilizes secrets. Gal Cohen and Liav Yona from Firefly provide an overview of the use cases and challenges of secrets in Kubernetes. They then discuss the benefits of secret store providers before delving into the Secrets Container Storage Interface (CSI), a novel, secure way of using secrets. Both the architecture and the demo presented during the talk are extremely helpful to practitioners.

Practical Challenges with Pod Security Admission – Now is the time to migrate from Pod Security Policies (PSP) to Pod Security Standards (PSS). The problem is, many workloads require some degree of privilege not easily mappable to PSS. In this timely talk, V. Körbes and Christian Schlotter from VMware tackle K8s workload migration to Pod Security Admission and describe the steps needed to identify issues with node deployments and the Container Storage Interface (CSI) controller. It is gratifying that a technical process as complex as PSP migration is getting the attention it deserves.

Least Privilege Containers: Keeping a Bad Day from Getting Worse – “Don’t run containers as root” is the security mantra that has been with us for years. Nevertheless, most containers run as root because of migration difficulties and the privileges required by numerous processes. Greg Castle and Vinayak Goyal from Google offer their unique perspective on migrating GKE containers to non-root at scale. They explain the challenges they faced and the design choices behind their solutions. The last part of the talk is devoted to an increasingly relevant topic: Kubernetes adoption of user namespaces and its game-changing potential for container security.

Canals and Bridges: Using Amsterdam’s Transit System to Secure K8s Networks – Cailyn Edwards from Shopify provides a fresh take on Kubernetes by comparing it to the Amsterdam canal system. This analogy proves effective in explaining general Kubernetes security controls with an emphasis on secure networking within its components. Her demo contains an application of the inspektor gadget tool to showcase how easy it is to create a workload seccomp profile and a network policy. This is a useful talk for those looking to upgrade their cluster security via stricter policies.

What Can Go Wrong When You Trust Nobody? Threat Modeling Zero Trust – In another solid modeling session by Control Plane, James Callaghan and Richard Featherstone present Zero Trust environment threat modeling. Their demos are especially valuable in showing the practical applications of security controls (including Spire and OPA) used during the mitigation stage.

Last but not least, if you run managed GKE, AKS, or EKS clusters and want to know what kind of security risks they carry, you are invited to watch our talk, Cluster Grey Zone: Risks in Managed Cluster Middleware. It sheds a light on an overlooked attack surface in managed Kubernetes clusters and reveals some cool attack chains originating from middleware components that you might not be aware of.

This has been both the largest KubeCon + CloudNativeCon and largest open-source conference in Europe so far, with 58% of participants attending for their first time. Given the exponential growth this community has been experiencing recently, we are sure there are more record-breaking events to come.

We are now looking ahead to the next conference: KubeCon NA in Chicago.

계속 읽기

맞춤형 데모 받기

맞춤형 데모 신청하기

“내가 본 최고의 사용자 경험은 클라우드 워크로드에 대한 완전한 가시성을 제공합니다.”
데이비드 에슬릭최고정보책임자(CISO)
“Wiz는 클라우드 환경에서 무슨 일이 일어나고 있는지 볼 수 있는 단일 창을 제공합니다.”
아담 플레처최고 보안 책임자(CSO)
“우리는 Wiz가 무언가를 중요한 것으로 식별하면 실제로 중요하다는 것을 알고 있습니다.”
그렉 포니아토프스키위협 및 취약성 관리 책임자