Главная
Study mode:
on
1
eBPF for Creating Least Privileged Policies; What Do I Need... Natalia Reka Ivanko & John Fastabend
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Watch a technical conference talk exploring how eBPF technology enables the implementation of least privileged policies through kernel code injection while maintaining minimal application overhead. Learn from security experts as they demonstrate eBPF-based least privileged policies against known CVEs through live demonstrations. Discover how eBPF monitors process execution, system calls, networking, file access, and stack traces to establish known ordering patterns that significantly enhance security measures. Gain insights into the technology's strengths and ongoing developments aimed at preventing future security attacks, with practical examples of implementing the least privilege principle in cloud native environments.

eBPF for Creating Least Privileged Policies - Implementing Security Through Kernel Monitoring

CNCF [Cloud Native Computing Foundation]
Add to list