Session

Supply Chain Reaction: A Cautionary Tale in K8S Security

Your Kubernetes cluster seems bulletproof: network policies, mTLS, no external API access, GitOps workflows, and automated CI/CD. But you're still vulnerable.

This talk follows a real-world attack where a hacker bypasses traditional defenses through supply chain exploits: poisoned commits, tainted build tools, malicious images, and backdoored dependencies. A diligent DevOps engineer struggles to keep up.

But this isn’t just a tale of doom. Each attack vector is met with a practical counter using OpenSSF projects: Sigstore for image signing. SLSA attestations for build security, OpenVEX/SBOM for dependency protection, gittuf for source control

This session highlights how hardening the supply chain transforms into defense-in-depth without burdening the developer.

Takeaways include:
-How supply chain attacks bypass secure K8s setups
-Actionable implementation and enforcement of OpenSSF tooling, coordinated through the OSPS Baseline
-Practical CI/CD and GitOps integrity improvements

Stacey Potter

Community Manager, OpenSSF

New York City, New York, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top