Session

Watching the Watchers: The Hidden Risks of Container Scanning Tools

As organizations increasingly utilize container images for their production workloads, securing them becomes more critical. What happens if the vulnerability scanners used to scan these images contain vulnerabilities themselves? This talk will explore the hidden risks associated with container vulnerability scanning tools and how to mitigate these potential threats.

Container vulnerability scanning tools, like any other software, can have vulnerabilities. If not regularly updated and patched, they can become targets for attackers who exploit these weaknesses to compromise critical systems. Also, these tools often require elevated privileges, leading to misuse or unauthorized access, posing significant security risks.

After this session, you'll learn:
- False positives and false negatives
- Identifying dependency issues
- Strategies for isolation and segmentation
- Secure configurations
- Managing permissions and access
- Applying defense-in-depth strategies

Chad M. Crowell

Platform Engineer at Civo, CNCF Ambassador, Speaker, and Author

Austin, Texas, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top