Session

Bootable Containers for Secure and Compliant 'Appliance' Operating Systems

Bootable containers (bootc), a CNCF Sandbox project, allow teams to define and ship entire operating systems as container images. This model is compelling for security appliances and edge devices that benefit from atomic updates, extending ostree with the familiar Containerfile build construct.

However, making appliance operating systems easy to build is only half the problem. For security sensitive systems, how do you ensure they cannot jump off their defined release train? This requires hardening the build, release, and update cycle.

This talk demonstrates a hardening strategy for bootc-based Fedora appliances: CI that builds, hardens via CIS benchmarks, and signs with Sigstore cosign. On deployed systems, policy enforcement SELinux lockdown, and enforced kernel arguments close attack surfaces — even against root. Attendees will learn to build and enforce a complete OS image trust chain using container tooling.

Ethan Troy

Principal @ Fortreum | Cloud Security Compliance and Automation

Orlando, Florida, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top