Loading…
October 24 - 25, 2022 | Detroit, Michigan
View More Details | Registration Information

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for KubeCon + CloudNativeCon North America 2022 - Detroit, MI + Virtual and add this Co-Located event to your registration to participate in these sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in Eastern Daylight Time (EDT), UTC -4. To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date."

The schedule is subject to change.
Software Supply Chain/OSS Security Issues [clear filter]
Monday, October 24
 

11:00am EDT

Day in the Life of a Base Image: The Evolution of Vulnerabilities in the Most Popular Containers - Ayse Kaya, Slim.AI
While container scanning & security is becoming more widely adopted, it’s still not well-understood how these containers evolve over time from a security perspective. This includes understanding the long-term security posture of these containers, whether it is improving or declining as new vulnerabilities are discovered. 

 This talk will take a first-time look at why handling vulnerabilities in containers is a really sticky problem to begin with, with known vulnerabilities requiring patching, as new vulnerabilities arise constantly, and many other vulnerabilities simply falling into a catchall bucket of "won't fix" . We'll show data visualizations of how the attack surface of two mega-popular public container images (Python, NodeJS) have changed over the past year, highlighting the problem developers and DevSecOps teams are facing. We'll demonstrate how some of the most popular vulnerability scanners show different results, sometimes to extreme degrees. But stick around to the very end, because on the upside, we'll wrap up with practical steps developers can take to stay on top of vulnerabilities and prevent their dev process from grinding to a halt.

Speakers
avatar for Ayse Kaya

Ayse Kaya

Senior Director of Strategy and Analytics, Slim.AI
Ayse Kaya is the Senior Director of Strategy and Analytics at Slim.AI. She is an accredited data scientist and container enthusiast. A graduate of the MIT Sloan School of Management's Operations Research Center, Kaya was previously a strategy and analytics lead at CloudLock and Cisco... Read More →


Monday October 24, 2022 11:00am - 11:30am EDT
Room 330 AB Huntington Place: 1 Washington Blvd, Detroit, MI 48226
  Sessions

1:25pm EDT

Building Images for the Secure Supply Chain - Adrian Mouat, Chainguard
Security scans getting you down? Users complaining they can't verify your images? Have no idea if your systems are vulnerable to the latest exploit? Want to improve your SLSA level but don't know where to start? You're not alone -- all organisations face these issues. This talk will walk through techniques and tooling that you can use today to address these concerns. In particular it will cover: - The distroless philosophy; why minimal images can save you from scan report purgatory - The importance of updating images and dependencies - Using apko to build container images with SBOMs and complete reproducibility - Signing images with Sigstore The best bit? These tools and techniques will make your systems simpler and faster. Adding security doesn't have to mean hurting usability or productivity.

Speakers
avatar for Adrian Mouat

Adrian Mouat

Technical Community Advocate, Chainguard
Adrian has been involved with containers from the early days of Docker and authored the O’Reilly book “Using Docker”. He works at Chainguard whose mission is to make the software lifecycle secure by default. His current focus is on improving the standard of security and provenance... Read More →



Monday October 24, 2022 1:25pm - 1:55pm EDT
Room 330 AB Huntington Place: 1 Washington Blvd, Detroit, MI 48226
  Sessions

2:00pm EDT

How’s Your Supply Chain with Your Insecure OSS Ingestion? - James Holland, Citi
OSS libraries can be used by anyone, but how does an enterprise secure what should, or more importantly, should not be used? The package/artifact managers are at best simple proxies, so security checking is mostly beyond them. Moreover, within enterprises, these tasks end up being manual. This talk will outline the additional checks that should/could be performed at ingestion and subsequently; continuous automated grooming of OSS artifacts. James will demonstrate the Continuous Secure Software Ingestion (CSSI) application, a policy driven system built on Tekton & Open Policy Agent (OPA), to perform continuous secure ingestion from any source, including Google AOS. He will also show the additional constraints that are placed on the downstream enterprise Software Composition Analysis (SCA) tooling to handle the data graph that this generates.

Speakers
avatar for James Holland

James Holland

CISO Director of AppSec, Citi
James leads the AppSec space at Citi; he has contributed to OWASP standards, such as Top 10 and ASVS, as well as mentoring on OIDC/OAuth2 standards based on PSD2/OpenBanking as part of he role with the UK’s OBIE working groups.



Monday October 24, 2022 2:00pm - 2:30pm EDT
Room 330 AB Huntington Place: 1 Washington Blvd, Detroit, MI 48226
  Sessions

2:35pm EDT

Uncovering the History of Your Software Artifacts - Mikhail Swift, TestifySec
Discovering who, how, and where a software artifact was created is a daunting task. Archivist is an open source In-Toto attestation index and store, allowing you to uncover the history and establish trust of a software artifact. Archivist allows you to discover the attestations you need to satisfy your in-toto policies and ensure only trusted artifacts make it to production. In this talk we’ll use Witness (an In-Toto implementation) to create attestations about a build process of an attestation and store them in Archivist. Then we will create a Witness policy and enforce it while querying Archivist to discover relevant attestations to satisfy the policy.

Speakers
avatar for Mikhail Swift

Mikhail Swift

CTO, TestifySec
Mikhail is the co-founder and CTO of TestifySec, a company focusing in software supply chain security solutions. Mikhail has contributed to the in-toto project and has a passion for open source software.



Monday October 24, 2022 2:35pm - 3:05pm EDT
Room 330 AB Huntington Place: 1 Washington Blvd, Detroit, MI 48226
  Sessions
 
Tuesday, October 25
 

11:35am EDT

Source Attestations with Gitsign - Billy Lynch, Chainguard
Attestations are a useful tool for attaching supply chain metadata to artifacts and images, but how can we attach attestations to source code itself? In this talk, we'll go into some of the ways you can attach attestations to source code with Git. Learn how data can be stored verifiably alongside commits, how attestations can be modeled to describe SLSA source requirements, and how tools like Gitsign can make this easy to add to your CI/CD pipelines.

Speakers
avatar for Billy Lynch

Billy Lynch

Staff Software Engineer, Chainguard
Billy is a staff software engineer at Chainguard, working on developer tools and securing software supply chains for everyone! He is an active contributor and maintainer to the Sigstore, Tekton, and gittuf projects, and is the creator of Sigstore Gitsign.


Tuesday October 25, 2022 11:35am - 11:45am EDT
Room 330 AB Huntington Place: 1 Washington Blvd, Detroit, MI 48226

3:05pm EDT

Know Your Dependencies: A Guide to Automating Dependency Assurance - Steve Judd, Jetstack
It is a truth universally acknowledged that almost every modern software component contains a selection of external dependencies whose provenance is unknown. Another truth is that no dependency should be trusted until proven trustworthy. This second truth, though, is often ignored by organisations and their engineering teams, who argue that assuring the trustworthiness of dependencies is too complex, too time-consuming and has a detrimental impact on development velocity. This talk will describe how Jetstack has worked with several clients in the financial services and defence sectors to help them develop dependency assurance mechanisms and processes that allow greater visibility and insight into the dependencies used and their impact on the clients’ risk and security postures. The audience will learn how modern tooling and practices can be used to create efficient, automated pipelines that audit dependencies for vulnerabilities and licence obligations, assess them against the organisation’s security policies and ultimately provide the ability to control which dependencies can be used and deployed within the organisation.

Speakers
avatar for Steve Judd

Steve Judd

Senior Solutions Architect, Jetstack
Steve Judd, a Solutions Architect at Jetstack and Certified Kubernetes Administrator, has spent the last 6 years helping organisations successfully transition to Kubernetes. He has a wealth of experience in dealing with the challenges of developing distributed applications and improving... Read More →



Tuesday October 25, 2022 3:05pm - 3:35pm EDT
Room 321 Huntington Place: 1 Washington Blvd, Detroit, MI 48226

3:40pm EDT

See It to Believe It: Bringing Observability to Otherwise Opaque Container Builds - Parth Patel, Kusari & Shripad Nadgowda, Intel
Container build is arguably one of the most security sensitive operations in the whole application supply chain spectrum, which has largely remained opaque to date. It is typically implemented as a multi-stage process in the Continuous Integration (CI) pipeline that includes cloning the source code, resolving and downloading dependencies, compiling and packaging applications and finally publishing the built artifacts. To establish trust in the final built artifact, it is not sufficient to ensure security guarantees around just the built artifact, but it is critical to provide provenance and integrity assurance for every action in the pipeline that went into building that artifact. While tools, such as Tekton Chains, provide visibility into the steps that were performed and components that were used during the build process, we are still missing the lower level syscalls that were made. In this presentation, Parth and Shripad will present an open framework using tetragon to bring out-of-band runtime visibility and provide automated attestation for tekton based CI pipeline.

Speakers
avatar for Parth Patel

Parth Patel

Co-Founder, Kusari
Solutions Architect with 15+ years of CyberSecurity, DevOps, Software Development and Automation experience. He is an active member in the open source community contributing/path-finding on various projects. Maintainer on the OpenSSF project GUAC (Graph for Understanding Artifact... Read More →
avatar for Shripad Nadgowda

Shripad Nadgowda

Software Architect, Intel
Shripad is a Cloud Software Architect at Intel. He is currently leading multiple initiatives around software supply chain security, especially in the area of operationalization and management of SBOM , CICD pipeline security and provenance readiness. He is also actively engaged in... Read More →



Tuesday October 25, 2022 3:40pm - 4:10pm EDT
Room 321 Huntington Place: 1 Washington Blvd, Detroit, MI 48226
 
  • Timezone
  • Filter By Date Cloud Native SecurityCon North America 2022 Oct 24 -25, 2022
  • Filter By Venue Detroit, MI USA
  • Filter By Type
  • Badge Pick-Up
  • Breaks
  • Capture the Flag
  • COVID-19 Test Kit Pick-Up
  • Experiences
  • Hands-on Workshops
  • Keynotes
  • Lightning Talks
  • Opening/Closing Remarks
  • Sessions
  • Content Experience Level
  • Talk Type
  • Subject

Filter sessions
Apply filters to sessions.