Главная
Study mode:
on
1
Intro
2
Container Security Risks (Users' View)
3
(Extended) Container Threat Modeling
4
Container Attack Vectors (Attackers' View)
5
Container Attack Scenarios (AS)
6
Any Best Practice?
7
What Do We Have So Far?
8
What Else Can We Apply?
9
Not Enough Security Deployment!
10
Weaknesses (Still) Across Every Layer!
11
Unprivileged Sandboxing
12
Sandboxing Containers with Landlock
13
Defend Against Cross-HT Attacks
14
Containers with Core Scheduling
15
Can Hardware Assist?
16
An Augmented Threat Model
17
Secure - Confidential Containers
18
Gaps From A Bird's Eye View
19
A Further Augmented Threat Model?
Description:
Explore container runtime protection strategies in this comprehensive conference talk. Delve into the security challenges faced by containers in cloud-native environments, examining attack vectors and existing protection mechanisms like AppArmor, SELinux, and seccomp. Discover recent advancements in kernel-aided and hardware-aided security measures, including Landlock, Core Scheduling, Memory Protection Keys, and Trusted Execution Environments. Learn about necessary adaptations to container runtime and image specifications, policy enforcement, debugging, monitoring, logging, and alerting management. Gain insights into the current state and future developments of hardened two-way sandboxes for both security and privacy in container environments.

Towards the Hardened Cloud-Native Cornerstone: Container Runtime Protection

CNCF [Cloud Native Computing Foundation]
Add to list
0:00 / 0:00