Session
Kubernetes Runtime Security - Detecting and Preventing Real-World Attacks
While many teams focus on securing their Kubernetes clusters during deployment, runtime security often gets overlooked. This talk demonstrates real attack scenarios and shows how to implement practical runtime security measures to detect and prevent them. Through live demonstrations and real-world examples, we'll explore how to build a robust runtime security strategy that doesn't compromise application performance.
Takeaways
1. How to identify and prevent common runtime attacks
2. Practical implementation of security monitoring
3. Tools and techniques for threat detection
4. Performance optimization strategies
5. Incident response procedures
6. Real-world security policy examples
Outline for the talk:
1. Understanding Runtime Threats (7 minutes)
Common attack vectors in production clusters
Container escape techniques
Privilege escalation paths
Supply chain attacks
Runtime vulnerability exploitation
Crypto mining detection
2. Detection and Prevention Strategies (8 minutes)
Runtime security tools comparison (Falco, Tracee, Tetragon)
System call monitoring
Container behavioral analysis
Network activity monitoring
File integrity monitoring
Custom security policies
Integration with incident response systems
3. Live Demo (10 minutes)
Setting up runtime security monitoring
Simulating common attack scenarios:
Container escape attempt
Unauthorized process execution
Suspicious network connections
File system tampering
Demonstrating detection and response
Alert investigation workflow
Chaitanya Rahalkar
Software Security Engineer at Block Inc. (f.k.a. Square Inc.)
Austin, Texas, United States
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top