eBPF for Creating Least Privileged Policies - Implementing Security Through Kernel Monitoring
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Watch a technical conference talk exploring how eBPF technology enables the implementation of least privileged policies through kernel code injection while maintaining minimal application overhead. Learn from security experts as they demonstrate eBPF-based least privileged policies against known CVEs through live demonstrations. Discover how eBPF monitors process execution, system calls, networking, file access, and stack traces to establish known ordering patterns that significantly enhance security measures. Gain insights into the technology's strengths and ongoing developments aimed at preventing future security attacks, with practical examples of implementing the least privilege principle in cloud native environments.
Syllabus
eBPF for Creating Least Privileged Policies; What Do I Need... Natalia Reka Ivanko & John Fastabend
Taught by
CNCF [Cloud Native Computing Foundation]