SlideShare a Scribd company logo
Kubernetes Security 101
http://tremolo.io
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Who Am I?
● CTO Tremolo Security
● Identity Management expert for 20+ years
● Experience in commercial and federal agencies
● Kubernetes since 2015
● Co-Author Kubernetes an Enterprise Guide: 2nd Ed
Agenda
● Part I - Cluster Security
○ What is Kubernetes?
○ How users access the cluster
○ How pipelines access the cluster
○ Dashboards
○ NetworkPolicies
○ Secrets
○ Node Security
○ Defense-in-Depth
○ Multi-tenancy
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Agenda
● Part II - Container Security
○ How your application can be be a security risk
○ Basics of a secure image
○ SBOMs
○ Farm-to-Table Supply Chain Security
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
What is Kubernetes?
● Scheduler - Determines what containers should run and where
● Kubelet - Works with the scheduler to run and manage containers
● API Server - API for interacting with the Kubelet and Scheduler
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How users access the cluster
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How users access the cluster
● Kubernetes supports multiple authentication mechanisms:
○ Certificates
○ OpenID Connect
○ Impersonating proxy
○ TokenRequest API
○ Custom Webhooks
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How users access the cluster - Certificates
● “Break Glass” authentication
● Can’t be revoked
● Hardware certificates aren’t supported
● External CAs not supported
● Groups only supported through static subject mapping
● Requires point-to-point connectivity between the client and server
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How users access the cluster - OpenID Connect
● Use of a JSON Web Token (JWT)
● Bearer token
● Easily maps groups
● Should be short lived (1-2 minutes with clock skew)
● Allows for network segmentation
● Can not be revoked
● JWT Demo
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How users access the cluster - Impersonating Proxy
● Reverse Proxy authenticates users
● Reverse proxy sends headers with
the user’s request to tell the API
server who the user is
● Impersonation proxy is responsible
for authorizing inbound
impersonation
● ServiceAccount for Impersonating
Proxy is a privileged account
● Important to tie API access back to
original request
● Impersonation Demo
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How users access the cluster - TokenRequest API
● JWT issued by API Server
● Intended for identifying workloads to the API Server
● Intended for identifying workloads to external services
● Not meant for use from outside of the cluster
● Demo of a container talking to the API server
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How users access the cluster - Custom Webhooks
● If you’re not a cloud provider, don’t do it
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How users access the cluster - RBAC
● How the API server authorizes access
● Two Scopes
○ Cluster - Objects that impact everyone
○ Namespaced - Objects that are contained inside of a Namespace
■ Namespaces are Cluster scoped
● Roles/ClusterRoles → Define permissions
● RoleBindings/ClusterRoleBindings → Assign permissions
● Rights are enumerated
● No “negative” rights
● Don’t use “*”
● Bindings - Groups, not Users
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How users access the cluster - RBAC Aggregate
Roles
● Create large Roles & ClusterRoles without maintaining large objects
● Uses labels to assemble a Role/ClusterRole from smaller Roles/ClusterRoles
● Examples are admin, editor
● How to let an admin create a new instance of a CRD
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How pipelines access the cluster
● Don’t use long lived tokens
● Use a local identity to get short lived
token
● Spire (project) & SPIFFE (standards)
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Dashboards
● Centralized
○ Can be secured via reverse proxy and impersonation
○ Should never have a privileged identity
○ Rely on the user’s identity
● Local
○ Uses user’s kubectl configuration
○ Opens a local port on loop-back with no TLS or authentication
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
NetworkPolicies
● “Firewalls” of the cluster
● Control both inbound and outbound traffic
● Dependent on CNI implementation
● Not on by default
● Important to add
● Demo of network policy
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Secrets
● Stored in etcd as base64 encoded string
○ Encoded to preserve binary data
● Threat model your Secrets
○ Plain Kubernetes Secrets are Fine - https://bit.ly/3K1nEcU
● Externalize Secrets
○ Mount directly to Pods
○ Synchronize Secrets
● DON’T EVER STORE SECRETS IN GIT OR HELM, EVEN WHEN
ENCRYPTED
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Node Security
● Don’t run containers as root
○ Unless you need to run a container as root
○ Init containers
● Limit, or drop all, capabilities
● You don’t need a port under 1024
● Admission Controller Webhooks - Enforce rules
● Mutating Webhooks - Enable sane defaults
● Common Tools
○ Pod Security Standards
○ OPA/GateKeeper
○ Kyverno
○ JSPolicy
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Defense-in-depth
● Don’t rely on a single layer
● Strong Identity+RBAC+Policy Enforcement
● Multi-factor Authentication
● Short lived tokens
● Self Service
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Multitenancy
● Better utilization of resources
● Manage sprawl
● “Something” needs to be multitenant
● Self Service
● Combination of all of the above
● Virtual clusters
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Part II
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
How Your Application Can Be A Security Risk
● ServiceAccount token mounted to your Pod
● RCE from an app can lead to access to your Pod’s tokens
● Lack of sane defaults and policies lead to a container breakout
● Leaking bearer tokens
● Debug tools
○ “Distroless” containers
○ Ephemeral Containers
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Basics of a Secure Image
● Switch from root
● Assume no Linux userid
● Write only to volumes
○ emptyDir for “scratch space”
● Rebuild often
● Be mindful of where you get base images from
● Take contracts and policies into consideration
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Software Bill of Materials
● Multiple standards
● Stored with containers
● Signed?
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Farm-to-table Supply Chain Security
Container
registry
Proof
https://openunison.github.io / @mlbiam / @mlbiam@fosstodon.org
Farm-to-table Supply Chain Security
Test Lab Build Infrastructure
Connect with us
● Web - https://openunison.github.io / http://tremolo.io
● Twitter - @tremolosecurity / @mlbiam
● Masstodon - @mlbiam@fosstodon.org / @tremolo@hachyderm.io
● GitHub - http://github.com/tremolosecurity/ / http://github.com/openunison/
Ad

Recommended

Kubernetes 101 for_penetration_testers_-_null_mumbai
Kubernetes 101 for_penetration_testers_-_null_mumbai
n|u - The Open Security Community
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE - ATT&CKcon
 
User authentication and authorizarion in Kubernetes
User authentication and authorizarion in Kubernetes
Neependra Khare
 
Kubernetes security
Kubernetes security
Thomas Fricke
 
PowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
Nikhil Mittal
 
Purple Teaming with ATT&CK - x33fcon 2018
Purple Teaming with ATT&CK - x33fcon 2018
Christopher Korban
 
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK Matrix
MITRE ATT&CK
 
Kubernetes Cluster vs Nodes vs Pods vs Containers Comparison
Kubernetes Cluster vs Nodes vs Pods vs Containers Comparison
jeetendra mandal
 
[네전따] 네트워크 엔지니어에게 쿠버네티스는 어떤 의미일까요
[네전따] 네트워크 엔지니어에게 쿠버네티스는 어떤 의미일까요
Jo Hoon
 
K8s security best practices
K8s security best practices
Sharon Vendrov
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Katie Nickels
 
Beyaz Şapkalı Hacker CEH Eğitimi - Pasif Bilgi Toplama (OSINT)
Beyaz Şapkalı Hacker CEH Eğitimi - Pasif Bilgi Toplama (OSINT)
PRISMA CSI
 
Palestra Medindo seu nível de Visibilidade e Detecção usando ATT&CK e DeTT&CT
Palestra Medindo seu nível de Visibilidade e Detecção usando ATT&CK e DeTT&CT
Tenchi Security
 
Dapr - A 10x Developer Framework for Any Language
Dapr - A 10x Developer Framework for Any Language
Bilgin Ibryam
 
Code Security with GitHub Advanced Security
Code Security with GitHub Advanced Security
Luis Fraile
 
Kubernetes and container security
Kubernetes and container security
Volodymyr Shynkar
 
Github
Github
Nikhil Baby
 
Introduction to Kubernetes RBAC
Introduction to Kubernetes RBAC
Kublr
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016
Matthew Dunwoody
 
Designing APIs with OpenAPI Spec
Designing APIs with OpenAPI Spec
Adam Paxton
 
Kubernetes - Security Journey
Kubernetes - Security Journey
Jerry Jalava
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
Sqrrl
 
Introduction to GitHub Actions
Introduction to GitHub Actions
Bo-Yi Wu
 
[개인 프로젝트] 쿠버네티스를 이용한 개발환경 자동화 구축시스템 - 프로토타입
[개인 프로젝트] 쿠버네티스를 이용한 개발환경 자동화 구축시스템 - 프로토타입
choi sungwook
 
FOSDEM 2017: GitLab CI
FOSDEM 2017: GitLab CI
OlinData
 
Introduction to kubernetes
Introduction to kubernetes
Gabriel Carro
 
Microservices Testing Strategies JUnit Cucumber Mockito Pact
Microservices Testing Strategies JUnit Cucumber Mockito Pact
Araf Karsh Hamid
 
Kubernetes Security
Kubernetes Security
Karthik Gaekwad
 
Cncf microservices security
Cncf microservices security
Leonardo Gonçalves
 
Introduction to Kubernetes Security (Aqua & Weaveworks)
Introduction to Kubernetes Security (Aqua & Weaveworks)
Weaveworks
 

More Related Content

What's hot (20)

[네전따] 네트워크 엔지니어에게 쿠버네티스는 어떤 의미일까요
[네전따] 네트워크 엔지니어에게 쿠버네티스는 어떤 의미일까요
Jo Hoon
 
K8s security best practices
K8s security best practices
Sharon Vendrov
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Katie Nickels
 
Beyaz Şapkalı Hacker CEH Eğitimi - Pasif Bilgi Toplama (OSINT)
Beyaz Şapkalı Hacker CEH Eğitimi - Pasif Bilgi Toplama (OSINT)
PRISMA CSI
 
Palestra Medindo seu nível de Visibilidade e Detecção usando ATT&CK e DeTT&CT
Palestra Medindo seu nível de Visibilidade e Detecção usando ATT&CK e DeTT&CT
Tenchi Security
 
Dapr - A 10x Developer Framework for Any Language
Dapr - A 10x Developer Framework for Any Language
Bilgin Ibryam
 
Code Security with GitHub Advanced Security
Code Security with GitHub Advanced Security
Luis Fraile
 
Kubernetes and container security
Kubernetes and container security
Volodymyr Shynkar
 
Github
Github
Nikhil Baby
 
Introduction to Kubernetes RBAC
Introduction to Kubernetes RBAC
Kublr
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016
Matthew Dunwoody
 
Designing APIs with OpenAPI Spec
Designing APIs with OpenAPI Spec
Adam Paxton
 
Kubernetes - Security Journey
Kubernetes - Security Journey
Jerry Jalava
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
Sqrrl
 
Introduction to GitHub Actions
Introduction to GitHub Actions
Bo-Yi Wu
 
[개인 프로젝트] 쿠버네티스를 이용한 개발환경 자동화 구축시스템 - 프로토타입
[개인 프로젝트] 쿠버네티스를 이용한 개발환경 자동화 구축시스템 - 프로토타입
choi sungwook
 
FOSDEM 2017: GitLab CI
FOSDEM 2017: GitLab CI
OlinData
 
Introduction to kubernetes
Introduction to kubernetes
Gabriel Carro
 
Microservices Testing Strategies JUnit Cucumber Mockito Pact
Microservices Testing Strategies JUnit Cucumber Mockito Pact
Araf Karsh Hamid
 
Kubernetes Security
Kubernetes Security
Karthik Gaekwad
 
[네전따] 네트워크 엔지니어에게 쿠버네티스는 어떤 의미일까요
[네전따] 네트워크 엔지니어에게 쿠버네티스는 어떤 의미일까요
Jo Hoon
 
K8s security best practices
K8s security best practices
Sharon Vendrov
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Katie Nickels
 
Beyaz Şapkalı Hacker CEH Eğitimi - Pasif Bilgi Toplama (OSINT)
Beyaz Şapkalı Hacker CEH Eğitimi - Pasif Bilgi Toplama (OSINT)
PRISMA CSI
 
Palestra Medindo seu nível de Visibilidade e Detecção usando ATT&CK e DeTT&CT
Palestra Medindo seu nível de Visibilidade e Detecção usando ATT&CK e DeTT&CT
Tenchi Security
 
Dapr - A 10x Developer Framework for Any Language
Dapr - A 10x Developer Framework for Any Language
Bilgin Ibryam
 
Code Security with GitHub Advanced Security
Code Security with GitHub Advanced Security
Luis Fraile
 
Kubernetes and container security
Kubernetes and container security
Volodymyr Shynkar
 
Introduction to Kubernetes RBAC
Introduction to Kubernetes RBAC
Kublr
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016
Matthew Dunwoody
 
Designing APIs with OpenAPI Spec
Designing APIs with OpenAPI Spec
Adam Paxton
 
Kubernetes - Security Journey
Kubernetes - Security Journey
Jerry Jalava
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
Sqrrl
 
Introduction to GitHub Actions
Introduction to GitHub Actions
Bo-Yi Wu
 
[개인 프로젝트] 쿠버네티스를 이용한 개발환경 자동화 구축시스템 - 프로토타입
[개인 프로젝트] 쿠버네티스를 이용한 개발환경 자동화 구축시스템 - 프로토타입
choi sungwook
 
FOSDEM 2017: GitLab CI
FOSDEM 2017: GitLab CI
OlinData
 
Introduction to kubernetes
Introduction to kubernetes
Gabriel Carro
 
Microservices Testing Strategies JUnit Cucumber Mockito Pact
Microservices Testing Strategies JUnit Cucumber Mockito Pact
Araf Karsh Hamid
 

Similar to Introduction to Kubernetes Security (20)

Cncf microservices security
Cncf microservices security
Leonardo Gonçalves
 
Introduction to Kubernetes Security (Aqua & Weaveworks)
Introduction to Kubernetes Security (Aqua & Weaveworks)
Weaveworks
 
Attacking and Defending Kubernetes - Nithin Jois
Attacking and Defending Kubernetes - Nithin Jois
OWASP Hacker Thursday
 
Appsecco Kubernetes Hacking Masterclass Presentation Slides
Appsecco Kubernetes Hacking Masterclass Presentation Slides
Appsecco
 
Protecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API Firewall
42Crunch
 
12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster
Suman Chakraborty
 
Kubernetes #3 security
Kubernetes #3 security
Terry Cho
 
DevSecOps in a cloudnative world
DevSecOps in a cloudnative world
Karthik Gaekwad
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
HansFarroCastillo1
 
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
James Anderson
 
Security for cloud native workloads
Security for cloud native workloads
Runcy Oommen
 
Fine-grained Authorization in a Containerized World
Fine-grained Authorization in a Containerized World
Ashutosh Narkar
 
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
NoNameCon
 
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
DevOpsDays Riga
 
Kubernetes security with AWS
Kubernetes security with AWS
Kasun Madura Rathnayaka
 
Santander DevopsandCloudDays 2021 - Hardening containers.pdf
Santander DevopsandCloudDays 2021 - Hardening containers.pdf
Juan Vicente Herrera Ruiz de Alejo
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
openfly
 
Security considerations while deploying Containerized Applications by Neepend...
Security considerations while deploying Containerized Applications by Neepend...
Agile India
 
Practical Guide to Securing Kubernetes
Practical Guide to Securing Kubernetes
Lacework
 
OpenStack: Security Beyond Firewalls
OpenStack: Security Beyond Firewalls
Giuseppe Paterno'
 
Introduction to Kubernetes Security (Aqua & Weaveworks)
Introduction to Kubernetes Security (Aqua & Weaveworks)
Weaveworks
 
Attacking and Defending Kubernetes - Nithin Jois
Attacking and Defending Kubernetes - Nithin Jois
OWASP Hacker Thursday
 
Appsecco Kubernetes Hacking Masterclass Presentation Slides
Appsecco Kubernetes Hacking Masterclass Presentation Slides
Appsecco
 
Protecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API Firewall
42Crunch
 
12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster
Suman Chakraborty
 
Kubernetes #3 security
Kubernetes #3 security
Terry Cho
 
DevSecOps in a cloudnative world
DevSecOps in a cloudnative world
Karthik Gaekwad
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
HansFarroCastillo1
 
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
James Anderson
 
Security for cloud native workloads
Security for cloud native workloads
Runcy Oommen
 
Fine-grained Authorization in a Containerized World
Fine-grained Authorization in a Containerized World
Ashutosh Narkar
 
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
NoNameCon
 
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
DevOpsDaysRiga 2018: Andrew Martin - Continuous Kubernetes Security
DevOpsDays Riga
 
Shmoocon 2013 - OpenStack Security Brief
Shmoocon 2013 - OpenStack Security Brief
openfly
 
Security considerations while deploying Containerized Applications by Neepend...
Security considerations while deploying Containerized Applications by Neepend...
Agile India
 
Practical Guide to Securing Kubernetes
Practical Guide to Securing Kubernetes
Lacework
 
OpenStack: Security Beyond Firewalls
OpenStack: Security Beyond Firewalls
Giuseppe Paterno'
 
Ad

More from All Things Open (20)

Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
 
Big Data on a Small Budget: Scalable Data Visualization for the Rest of Us - ...
Big Data on a Small Budget: Scalable Data Visualization for the Rest of Us - ...
All Things Open
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
Let's Create a GitHub Copilot Extension! - Nick Taylor, Pomerium
Let's Create a GitHub Copilot Extension! - Nick Taylor, Pomerium
All Things Open
 
Leveraging Pre-Trained Transformer Models for Protein Function Prediction - T...
Leveraging Pre-Trained Transformer Models for Protein Function Prediction - T...
All Things Open
 
Gen AI: AI Agents - Making LLMs work together in an organized way - Brent Las...
Gen AI: AI Agents - Making LLMs work together in an organized way - Brent Las...
All Things Open
 
You Don't Need an AI Strategy, But You Do Need to Be Strategic About AI - Jes...
You Don't Need an AI Strategy, But You Do Need to Be Strategic About AI - Jes...
All Things Open
 
DON’T PANIC: AI IS COMING – The Hitchhiker’s Guide to AI - Mark Hinkle, Perip...
DON’T PANIC: AI IS COMING – The Hitchhiker’s Guide to AI - Mark Hinkle, Perip...
All Things Open
 
Fine-Tuning Large Language Models with Declarative ML Orchestration - Shivay ...
Fine-Tuning Large Language Models with Declarative ML Orchestration - Shivay ...
All Things Open
 
Leveraging Knowledge Graphs for RAG: A Smarter Approach to Contextual AI Appl...
Leveraging Knowledge Graphs for RAG: A Smarter Approach to Contextual AI Appl...
All Things Open
 
Artificial Intelligence Needs Community Intelligence - Sriram Raghavan, IBM R...
Artificial Intelligence Needs Community Intelligence - Sriram Raghavan, IBM R...
All Things Open
 
Don't just talk to AI, do more with AI: how to improve productivity with AI a...
Don't just talk to AI, do more with AI: how to improve productivity with AI a...
All Things Open
 
Open-Source GenAI vs. Enterprise GenAI: Navigating the Future of AI Innovatio...
Open-Source GenAI vs. Enterprise GenAI: Navigating the Future of AI Innovatio...
All Things Open
 
The Death of the Browser - Rachel-Lee Nabors, AgentQL
The Death of the Browser - Rachel-Lee Nabors, AgentQL
All Things Open
 
Making Operating System updates fast, easy, and safe
Making Operating System updates fast, easy, and safe
All Things Open
 
Reshaping the landscape of belonging to transform community
Reshaping the landscape of belonging to transform community
All Things Open
 
The Unseen, Underappreciated Security Work Your Maintainers May (or may not) ...
The Unseen, Underappreciated Security Work Your Maintainers May (or may not) ...
All Things Open
 
Integrating Diversity, Equity, and Inclusion into Product Design
Integrating Diversity, Equity, and Inclusion into Product Design
All Things Open
 
The Open Source Ecosystem for eBPF in Kubernetes
The Open Source Ecosystem for eBPF in Kubernetes
All Things Open
 
Open Source Privacy-Preserving Metrics - Sarah Gran & Brandon Pitman
Open Source Privacy-Preserving Metrics - Sarah Gran & Brandon Pitman
All Things Open
 
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
 
Big Data on a Small Budget: Scalable Data Visualization for the Rest of Us - ...
Big Data on a Small Budget: Scalable Data Visualization for the Rest of Us - ...
All Things Open
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
Let's Create a GitHub Copilot Extension! - Nick Taylor, Pomerium
Let's Create a GitHub Copilot Extension! - Nick Taylor, Pomerium
All Things Open
 
Leveraging Pre-Trained Transformer Models for Protein Function Prediction - T...
Leveraging Pre-Trained Transformer Models for Protein Function Prediction - T...
All Things Open
 
Gen AI: AI Agents - Making LLMs work together in an organized way - Brent Las...
Gen AI: AI Agents - Making LLMs work together in an organized way - Brent Las...
All Things Open
 
You Don't Need an AI Strategy, But You Do Need to Be Strategic About AI - Jes...
You Don't Need an AI Strategy, But You Do Need to Be Strategic About AI - Jes...
All Things Open
 
DON’T PANIC: AI IS COMING – The Hitchhiker’s Guide to AI - Mark Hinkle, Perip...
DON’T PANIC: AI IS COMING – The Hitchhiker’s Guide to AI - Mark Hinkle, Perip...
All Things Open
 
Fine-Tuning Large Language Models with Declarative ML Orchestration - Shivay ...
Fine-Tuning Large Language Models with Declarative ML Orchestration - Shivay ...
All Things Open
 
Leveraging Knowledge Graphs for RAG: A Smarter Approach to Contextual AI Appl...
Leveraging Knowledge Graphs for RAG: A Smarter Approach to Contextual AI Appl...
All Things Open
 
Artificial Intelligence Needs Community Intelligence - Sriram Raghavan, IBM R...
Artificial Intelligence Needs Community Intelligence - Sriram Raghavan, IBM R...
All Things Open
 
Don't just talk to AI, do more with AI: how to improve productivity with AI a...
Don't just talk to AI, do more with AI: how to improve productivity with AI a...
All Things Open
 
Open-Source GenAI vs. Enterprise GenAI: Navigating the Future of AI Innovatio...
Open-Source GenAI vs. Enterprise GenAI: Navigating the Future of AI Innovatio...
All Things Open
 
The Death of the Browser - Rachel-Lee Nabors, AgentQL
The Death of the Browser - Rachel-Lee Nabors, AgentQL
All Things Open
 
Making Operating System updates fast, easy, and safe
Making Operating System updates fast, easy, and safe
All Things Open
 
Reshaping the landscape of belonging to transform community
Reshaping the landscape of belonging to transform community
All Things Open
 
The Unseen, Underappreciated Security Work Your Maintainers May (or may not) ...
The Unseen, Underappreciated Security Work Your Maintainers May (or may not) ...
All Things Open
 
Integrating Diversity, Equity, and Inclusion into Product Design
Integrating Diversity, Equity, and Inclusion into Product Design
All Things Open
 
The Open Source Ecosystem for eBPF in Kubernetes
The Open Source Ecosystem for eBPF in Kubernetes
All Things Open
 
Open Source Privacy-Preserving Metrics - Sarah Gran & Brandon Pitman
Open Source Privacy-Preserving Metrics - Sarah Gran & Brandon Pitman
All Things Open
 
Ad

Recently uploaded (20)

Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Safe Software
 
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
Data Validation and System Interoperability
Data Validation and System Interoperability
Safe Software
 
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
Floods in Valencia: Two FME-Powered Stories of Data Resilience
Floods in Valencia: Two FME-Powered Stories of Data Resilience
Safe Software
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
Edge-banding-machines-edgeteq-s-200-en-.pdf
Edge-banding-machines-edgeteq-s-200-en-.pdf
AmirStern2
 
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
Safe Software
 
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
Safe Software
 
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Puppy jhon
 
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
NTT DATA Technology & Innovation
 
June Patch Tuesday
June Patch Tuesday
Ivanti
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Reducing Conflicts and Increasing Safety Along the Cycling Networks of East-F...
Reducing Conflicts and Increasing Safety Along the Cycling Networks of East-F...
Safe Software
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Safe Software
 
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
Data Validation and System Interoperability
Data Validation and System Interoperability
Safe Software
 
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
War_And_Cyber_3_Years_Of_Struggle_And_Lessons_For_Global_Security.pdf
biswajitbanerjee38
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
Floods in Valencia: Two FME-Powered Stories of Data Resilience
Floods in Valencia: Two FME-Powered Stories of Data Resilience
Safe Software
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
Edge-banding-machines-edgeteq-s-200-en-.pdf
Edge-banding-machines-edgeteq-s-200-en-.pdf
AmirStern2
 
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
Safe Software
 
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
Safe Software
 
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Puppy jhon
 
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
Can We Use Rust to Develop Extensions for PostgreSQL? (POSETTE: An Event for ...
NTT DATA Technology & Innovation
 
June Patch Tuesday
June Patch Tuesday
Ivanti
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Reducing Conflicts and Increasing Safety Along the Cycling Networks of East-F...
Reducing Conflicts and Increasing Safety Along the Cycling Networks of East-F...
Safe Software
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 

Introduction to Kubernetes Security