Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CNCF [Cloud Native Computing Foundation]

eBPF for Creating Least Privileged Policies - Implementing Security Through Kernel Monitoring

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Watch a technical conference talk exploring how eBPF technology enables the implementation of least privileged policies through kernel code injection while maintaining minimal application overhead. Learn from security experts as they demonstrate eBPF-based least privileged policies against known CVEs through live demonstrations. Discover how eBPF monitors process execution, system calls, networking, file access, and stack traces to establish known ordering patterns that significantly enhance security measures. Gain insights into the technology's strengths and ongoing developments aimed at preventing future security attacks, with practical examples of implementing the least privilege principle in cloud native environments.

Syllabus

eBPF for Creating Least Privileged Policies; What Do I Need... Natalia Reka Ivanko & John Fastabend

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of eBPF for Creating Least Privileged Policies - Implementing Security Through Kernel Monitoring

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.