Overview
Explore a comprehensive container security checklist in this 52-minute CNCF conference talk. Learn about essential security measures for build machines, Docker files, and executable scanning. Discover the most dangerous flags, Linux capabilities, and dash privilege in running containers. Examine container hosts, Kubernetes security, and application secrets management. Gain insights into binary authorization for container instances and participate in a demo and Q&A session to reinforce your understanding of container security best practices.
Syllabus
Introduction
Lizs book
Build machines
Docker files
All executables
Scanning
Running Containers
Most Dangerous Flag
Linux Capabilities
Dash Privilege
Container Hosts
Kubernetes
QA
Application Secrets
Kubernetes Secrets
Demo
Questions
Container Instances
Binary Authorization
Taught by
CNCF [Cloud Native Computing Foundation]