Главная
Study mode:
on
1
Intro
2
Why sign & verify images?
3
Modern Consensus on Image Signing
4
Signature Metadata in a Registry
5
Signature Format: Payload
6
Signature Format: Envelope
7
Signature Format: Registry Layout
8
Signing as a Service
9
Signing Thin Client
10
Signing Service: Least Privilege & Auditability
11
Signing Service: Encapsulation
12
Validating Admission Webhooks
13
Image Verification in containerd
14
Developer Perspective
15
Distributing Verifier Config
16
Distributing Public Keys & Mode
17
Distributing Image Revocation List
18
Challenges & Recommendations
19
Takeaways
Description:
Explore Datadog's approach to image signing and runtime verification at scale in this conference talk. Delve into the challenges of securing container images across diverse engineering environments and learn about Datadog's unique solutions. Discover their service-oriented approach to image signing, which simplifies adoption across heterogeneous build environments. Understand why they chose to validate image signatures at runtime using a containerd plugin system instead of Kubernetes admission controllers. Gain insights into the design decisions, implementation details, and real-world experiences of operating this system in production. Learn about signature metadata, formats, and registry layouts, as well as the benefits of a signing service for least privilege and auditability. Examine the developer perspective, distribution of verifier configurations, public keys, and image revocation lists. Conclude with valuable takeaways and recommendations for implementing similar systems in your own environment. Read more

Image Signing and Runtime Verification at Scale - Datadog's Journey

CNCF [Cloud Native Computing Foundation]
Add to list