Session
Untrusted Execution: Attacking the Cloud Native Supply Chain
Should we trust the code we run in our production workloads? Not if a motivated attacker can compromise our organisation's complex software supply chains.
While hardened Kubernetes runtimes can mitigate some attacks, motivated threat actors and software implants can be very hard to detect. Supply chain security looks to address some of these threats, but how can we apply that by-design and by-default? Securing software supply chains end-to-end is a non-trivial task, and requires consideration on preserving security properties such as integrity.
In this talk we: - Undertake a risk-based threat model of software supply chain attacks against our clusters - Compare the open source supply chain security controls available to us - Propose a solution for end-to-end supply chain security built on open-source tools such as Kubernetes, Helm, Tekton, Sigstore, SPIFFE/Spire, Vault, in-toto.
Marco De Benedictis
PhD, Senior Consultant at ControlPlane
Turin, Italy
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top