Sneak peek into kernel, syscalls, ebpf, kprobes, runtime security, Kubernetes API server bypass, tetragon protection, bypassing protection & more.
This workshop aims to break the security myths about managed Kubernetes clusters & demos a takeover attack on an exposed EKS cluster with default configuration & insecure workloads.
This workshop aims to kick a notch higher by introducing you to the security aspects of the container world.
Notes for an extensive 2.5 hour workshop
Running a rootless container in a few lines of Go code with just linux syscalls
UI interface for drone CI/CD
Runs as validating admission controller to verify integrity of images
Improving the security audit logging in Harbor using OpenResty & change of architectural design
Helm chart for Giant Swarm's management of the Kyverno
Kubernetes Admission Controller Webhook Demo