Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update day09.md #482

Merged
merged 1 commit into from
Jan 8, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file added 2024/Images/day09-1.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
30 changes: 30 additions & 0 deletions 2024/day09.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
Day 2: Why should developers care about container security?
=========================

## Video
[![Day 3: Why should developers care about container security? ](link TBD)


## About Me
[Eric Smalling](https://about.me/ericsmalling)<br>
Staff Solutions Architect at [Chainguard](https://chainguard.dev)

For about 30 years, I've been an enterprise software developer, architect, and consultant with a focus on CI/CD, DevOps, and container-based solutions over the last decade.

I am also a Docker Captain, and am certified in Kubernetes (CKA, CKAD, CKS), and have been a Docker user since 2013.

![Eric Smalling](Images/day09-1.jpg)

## Description?
Container scanning tools, industry publications, and application security experts are constantly telling us about best practices for how to build our images and run our containers.
Often these non-functional requirements seem abstract and are not described well enough for those of us that don’t have an appsec background to fully understand why they are important.

This session explores several of the most common secure container practices, shows examples of how workloads can be exploited if not followed and, most importantly,
how to easily find and fix issues when building containers BEFORE you ship them.
Additionally, we'll discuss tactics to minimize exploit exposure by hardening runtime container and Kubernetes configurations.

## Links referenced in the video
- Security Context blog: https://snyk.co/k8s-securitycontext
- Network Policy recipes: https://github.com/ahmetb/kubernetes-...
- Ko Build tool: https://ko.build
- Jib Build tool: https://github.com/GoogleContainerToo...