Главная
Study mode:
on
1
Introduction
2
Welcome
3
Why is the graph looking like this
4
Example
5
Vulnerability Scanner
6
Vulnerability Analysis
7
Image Scanners
8
Vulnerability Impact
9
Kubernetes
10
Release Engineering
11
Kubernetes Enhancement Proposal
12
Distroless
13
Base
14
Bash Static
15
QProxy
16
Not a perfect solution
17
Container images are complex
18
Imperfect solutions have benefits
19
Reduce churn
20
Vulnerability detection
21
How Kubernetes maintainers feel
22
Focus on code execution path
23
Give engineers breathing space
24
Create a list of images
25
Automated jobs
26
Questions
Description:
Explore the challenges and solutions in vulnerability management for container images in this conference talk. Learn how vulnerability scanners work, their limitations, and practical approaches to assess product security beyond raw vulnerability numbers. Discover strategies for implementing effective vulnerability management using Kubernetes images as an example. Gain insights into reducing false positives, focusing on code execution paths, and creating automated processes for vulnerability detection. Understand the complexities of container images and how to balance security concerns with practical solutions that allow engineers to work efficiently.

Keeping Up with CVEs: Finding Needles in Haystacks - Practical Vulnerability Assessment

CNCF [Cloud Native Computing Foundation]
Add to list
0:00 / 0:00