Loading…
November 18, 2019 | San Diego, California
View More Details & Register Here
Monday, November 18
 

8:00am PST

9:00am PST

Opening
Welcome Remarks

Monday November 18, 2019 9:00am - 9:15am PST
Marriott Marquis San Diego Marina - San Diego Ballroom A

9:15am PST

IBM Sponsored Session - Protecting Kubernetes Workloads from Attacks - Chris Rosen, IBM
Innovation and speed require cloud tools to build, deploy, and run cloud-native workloads. But how do I protect those workloads and mitigate the risks of running those apps in the cloud?  This demo showcases how you can easily isolate Kubernetes clusters to ensure outbound Internet traffic is routed through in-cluster virtual firewalls to protect your resources and intellectual property.

Speakers
avatar for Chris Rosen

Chris Rosen

Director, Product Management, IBM Cloud, IBM
Chris Rosen is a Director of Product Management for IBM Cloud Native PaaS and IBM Cloud Satellite. Chris is responsible for IBM Cloud’s containers and microservices portfolio. Chris has held a variety of roles in his 22-year career with IBM and is currently responsible for delivering... Read More →


Monday November 18, 2019 9:15am - 9:20am PST
Marriott Marquis San Diego Marina - San Diego Ballroom A

9:20am PST

The Path Less Traveled: Abusing Kubernetes Defaults - Duffie Cooley, VMware & Ian Coldwater, Heroku
While the industry and the community are starting to pay attention to Kubernetes security, there are many attack paths that aren’t well-documented, and are rarely discussed. This lack of information can make your clusters vulnerable.

In this live demonstration-filled talk, we are going to provide an overview of the Kubernetes control plane before using sigs.k8s.io/kind to show some of the attack surface exposed by a default configuration of Kubernetes. There will be multiple exploits involving various moving parts, including cluster takeovers and host escapes. We’ll show you mitigations, and then show you how to get around those.

The audience will walk away from this talk with a better understanding of Kubernetes’ default attack surface, how it can be exploited, and how to keep their clusters safer.

Speakers
avatar for Duffie Cooley

Duffie Cooley

Duffie Cooley, VMware
Duffie is a Staff Cloud Native Architect at VMware focused on helping enterprises find success with technologies like Kubernetes. Duffie has been working with all things virtualization and networking for 20 years and remembers most of it. He likes to present on topics ranging from... Read More →
avatar for Ian Coldwater

Ian Coldwater

Security Researcher, Independent
Ian Coldwater is co-chair of Kubernetes SIG Security, a longtime community organizer, and a security researcher specializing in hacking and hardening Kubernetes, containers, and cloud native infrastructure. When they're not busy making good trouble, they like to read all the docs... Read More →


Monday November 18, 2019 9:20am - 9:50am PST
Marriott Marquis San Diego Marina - San Diego Ballroom A

9:50am PST

Trusted Software Supply Chain with JTE - Steven Terrana, Booz Allen Hamilton
DevOps was all about getting application developers and operations engineers to work together more effectively.  In large part, automated testing and infrastructure as code enabled repeatable deployments we could be confident would work in production.  Unfortunately, bottlenecks frequently arose in the software delivery process because the security team was never pulled into the fold.  Enter DevSecOps.  In this talk, we’ll cover how to integrate security into every step of the software development lifecycle to build a trusted software supply chain to production and how the Jenkins Templating Engine can accelerate the adoption of these practices at scale in your organization.

Speakers
ST

Steven Terrana

Lead Technologist, Booz Allen Hamilton
Steven Terrana is a Lead Technologist at Booz Allen Hamilton. A Certified Kubernetes Administrator and Jenkins Contributor, he has built DevSecOps platforms and pipelines across multiple government agencies helping to maximize the velocity of over 50 development teams without sacrificing... Read More →


Monday November 18, 2019 9:50am - 10:20am PST
Marriott Marquis San Diego Marina - San Diego Ballroom A

10:20am PST

10:50am PST

10:55am PST

Slowing Our Role: Moving Towards Policy at Plex - John Reese, Plex Systems
In this talk, we'll walk through Plex's journey from role-based access to embracing policy.

To be fair, roles got us far at Plex. Roles can be a completely valid solution, especially for smaller systems. However, as we grew, we knew roles would not be able to solve all of our problems forever. Our solution? Policy.

Through policy, automation and autonomy became a reality. By defining policies upfront, we could include them in our environments and release processes, allowing for changes to be made without any human intervention. Policy also allowed us to focus on what we actually want to secure: data. Developers no longer have to concern themselves with permissions or roles and can just use the APIs they need to get their job done.

Our journey is not over yet, but you can still come hear all about where we started with role-based access control, where we are today, and where we want to be.

Speakers
avatar for John Reese

John Reese

Infrastructure Security Engineer, Yubico
John Reese is an Infrastructure Security Engineer at Yubico, who specializes in Kubernetes and Go. He is an active open source contributor and a core maintainer for Conftest, a tool that helps you write tests against structured configuration data. In his free time, he enjoys playing... Read More →



Monday November 18, 2019 10:55am - 11:25am PST
Marriott Marquis San Diego Marina - San Diego Ballroom A
  General Session
  • Session Slides Included Yes

11:25am PST

Continuous Assurance and Continuous Compliance via Data, Graph, Query and Code - Erkang Zheng, LifeOmic
Attackers see your digital environment in 3D. They know time is on their side because most vulnerabilities will have to be stumbled upon. For organizations to level the playing field, they need to move from viewing their environment linearly, in two dimensions, to three. To do that, tools need to change. The way data and relationships are mapped needs to change. A graph, not a checklist, is the only way to represent this complexity in a meaningful way. See how LifeOmic streamlines their DevOps process using a graph data model as augmented intelligence to achieve data-driven, automated security operations in the cloud. We’ll share our strategy doing a minimum of 20 deploys/week through a continuous security/compliance approach. View it as ‘compliance as code’.

Speakers
avatar for Erkang Zheng

Erkang Zheng

Founder, JupiterOne | CISO, LifeOmic, JupiterOne & LifeOmic


Monday November 18, 2019 11:25am - 11:55am PST
Marriott Marquis San Diego Marina - San Diego Ballroom A

11:55am PST

MLGuard -- Detecting Malicious Web Requests using a Serverless-based Machine Learning System - Abhinav Srivastava, Frame.io
Web Application Firewall (WAF) blocks incoming web requests using a variety of signatures such as SQL injection, Cross-Site Scripting, and Bots. Proactively identifying and blocking bad requests, which avoid exhibiting the known malicious patterns, is both challenging and essential from security operations perspective. In this talk, I will describe a serverless-based end-to-end system called MLGuard that ingests AWS load-balancers log data, creates a machine-learning model (Isolation Forest) with the frequency distribution of cumulative HTTP response code using Amazon SageMaker, invokes the model using the HTTP API to detect unusual requests, and sends alerts to Slack for the security team to block IPs. MLGuard utilizes various Serverless technologies such as Function-as-a-Service, DynamoDb, and API Gateway, and since its deployment a year ago, it has helped block thousands of bad IPs.

Speakers
avatar for Abhinav Srivastava

Abhinav Srivastava

VP and Head of Information Security, Frame.io
Abhinav Srivastava is the Head of Information Security at Frame.io, where he leads infrastructure, security, and compliance initiatives. Before joining Frame.io, Abhinav spent 6 years in AT&T Shannon Labs as a Principal Researcher working on systems, cloud, IoT, and network security... Read More →


Monday November 18, 2019 11:55am - 12:25pm PST
Marriott Marquis San Diego Marina - San Diego Ballroom A

12:25pm PST

Palo Alto Networks Sponsored Session - How to Choose Which Cloud Native Technologies Work Best for Specific Workloads - John Morello, Palo Alto Networks
As containers gain mainstream momentum, the cloud-native ecosystem is experiencing rapid growth of new technologies and projects that are spinning off and expanding from the initial core of containers. One particularly intense area of innovation is in workload deployment/management. There are many options in the cloud-native environment and the differences between these technologies are often small and nuanced. This makes it challenging to understand the benefits and tradeoffs between them. It’s helpful to think of the technologies being placed on a continuum. The continuum starts with bare metal and VMs on the left, continue into "light" hypervisors (like Canonical's LXD), and extends into containers and services like AWS Fargate and then, ultimately, serverless. Technologies to the left provide the most isolation and control with the tradeoff of greater management and performance overhead.  Those to the right facilitate more agile development and app density with the tradeoff of less control. In this talk, John Morello, VP of Product for Prisma by Palo Alto Networks, will demonstrate the continuum model, to address different scenarios and efficiently choose what technologies (or combination of technologies) work best for running different workloads. 

This session will cover:
  • How each cloud-native technology will address different workload scenarios.
  • How to choose which technology (or combination of technologies) is best for running different workloads.
  • The characteristics each cloud-native technology offers as it relates to isolation, compatibility and control, and the distinctions between each.

Speakers
avatar for John Morello

John Morello

Vice President, Product, Prisma Cloud, Prisma Cloud by Palo Alto
John Morello is the former Chief Technology Officer at Twistlock, and the current VP or Prisma at Palo Alto Networks. As CTO, John leads the work with strategic customers and partners and drives the product roadmap. Prior to Twistlock, John was the CISO of Albemarle, a Fortune 500... Read More →


Monday November 18, 2019 12:25pm - 12:30pm PST
Marriott Marquis San Diego Marina - San Diego Ballroom A

12:30pm PST

1:30pm PST

Open Spaces
Open Spaces provides the community an opportunity to discuss what topics matter to them most. Unlike the rest of the Cloud Native Security Day agenda, the Open Spaces agenda will be set by the attendees. Attendees will propose topics throughout the morning, and then attendees will vote on topics during lunch. After topics are set, attendees will break into 4-5 small groups to discuss the selected topics for 25 minutes. Each group will discuss a different topic, and attendees can float between each group as they see fit. For each group there should be a scribe that takes notes during the discussion. After 25 minutes, we will rotate topics and start the small group discussions again. At the end of Open Spaces we will reconvene as a group, and briefly share any takeaways from the discussion. For more details on the Open Space concept, you can read the Wikipedia article.

Monday November 18, 2019 1:30pm - 3:35pm PST
San Diego Ballroom A, Grand Ballroom 1, 2, 3, & 4

3:35pm PST

The Devil in the Details: Kubernetes’ First Security Assessment - Jay Beale, InGuardians & Aaron Small, Google
In October of last year, the Kubernetes project created a new Security Audit working group and began Kubernetes’ first comprehensive third-party security assessment. In the months that followed, we worked closely with Trail of Bits and Atredis Partners to assess and improve Kubernetes’ security posture. Through code review and penetration testing, we found and addressed 37 new vulnerabilities. With support from many Kubernetes contributors, the third party security firms and Kubernetes project produced a formal threat model covering eight critical components across six different trust zones. In this talk, we will share our findings, methodology, and vision for future security investments. We’ll discuss what the work uncovered, and what this means to Kubernetes security both now and for the future.

Speakers
avatar for Jay Beale

Jay Beale

CTO, InGuardians
- Co-lead of Kubernetes Security Audit Working Group- Architect and co-developer of the Peirates attack tool for Kubernetes- Created two broadly used security tools: Bastille Linux and the CIS’ first Linux scoring tool.- He teaches and speaks on Linux and Kubernetes at the Black... Read More →
avatar for Aaron Small

Aaron Small

Product Manager, Google



Monday November 18, 2019 3:35pm - 4:05pm PST
Marriott Marquis San Diego Marina - San Diego Ballroom A
  General Session
  • Session Slides Included Yes

4:05pm PST

4:20pm PST

 
Filter sessions
Apply filters to sessions.