Главная
Study mode:
on
1
Intro
2
Survey
3
Why Vulnerability Scanning
4
Penetration Testing vs Vulnerability Scanning
5
What is Vulnerability Scanning
6
Basic Package Discovery
7
Problem with Basic Package Discovery
8
Components which dont have metadata
9
Debian Vulnerability Database
10
Google Vulnerability Database
11
Summary
12
The problem is deep
13
Whats happening inside Docker
14
The problem with container results
15
The problem with libcurl
16
The problem with Busybox
17
Automating the decision process
18
Small research
19
Scripting magic
20
Vulnerability list
21
Automation
22
What it means
23
Vex
24
What is VX
25
VX in action
26
From VX perspective
27
Questions
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore vulnerability scanning in Kubernetes clusters and learn effective security measures in this comprehensive conference talk. Discover how to audit technical configurations, identify vulnerabilities, and apply patches to critical components. Delve into exploiting Kubernetes primitives for implementing robust security mechanisms, including RBAC, AdmissionController, NetworkPolicy, and SecurityContext. Enhance cluster security with Open Policy Agent for finer control and integrate Falco for detecting suspicious actions within containers and at the API Server level. Learn to implement a CI/CD pipeline with Clair for vulnerability analysis during image builds. Gain insights into penetration testing, package discovery challenges, vulnerability databases, and automating decision processes. Understand the complexities of container results, issues with specific components like libcurl and Busybox, and explore solutions such as VEX (Vulnerability Exploitability eXchange) for more accurate vulnerability assessments. Read more

Overcoming CVE Shock - Adding Perspective in Vulnerability Scanning

Devoxx
Add to list