Securing the Superpowers: Who Loaded That eBPF Program?
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Explore the critical aspects of eBPF security in this informative conference talk from KubeCon + CloudNativeCon Europe. Delve into the powerful capabilities of eBPF technology and its widespread adoption across various platforms, including Linux distributions, cloud environments, and even Windows. Discover the potential security risks associated with eBPF's extensive access to kernel data structures and networking packets. Learn about the Linux kernel community's efforts to develop a robust solution for monitoring and enforcing eBPF program loading. Gain insights into the design of eBPF auditing and security measures, with a practical demonstration using Tetragon, an open-source eBPF-based security tool. Understand how to restrict eBPF program loading, create comprehensive audit logs, and implement time series databases for enhanced security tracking. Equip yourself with the knowledge to address crucial security questions and protect your systems from potential eBPF-related vulnerabilities.
Syllabus
Securing the Superpowers: Who Loaded That EBPF Program? - John Fastabend & Natalia Reka Ivanko
Taught by
CNCF [Cloud Native Computing Foundation]