Go offline with the Player FM app!
Container Vulnerability Scanning
Manage episode 204322881 series 2285897
Show: 32
Show Overview:Tyler and Aaron Delp talk with Liz Rice (@lizrice, Technology Evangelist @AquaSecTeam) about what's easy—and what's not—about finding and patching security vulnerabilities in containers. This is a cross-over show with @TheCloudcastNet podcast.
Show Notes:
- Liz’s talk at Velocity Conf - “What’s so hard about container vulnerability scanning?”
- Use code CLOUD to get 20% off Velocity or OSCON tickets
- Aqua Security Homepage
- Liz Rice’s Blog
- [Video] Kubernetes, Metadata and You (KubeCon 2017 Austin)
Topic 1 - Welcome to the show Liz. Tell us a little bit about your background and the types of things that you’re working on these days.
Topic 2 - Let’s start with the basics. A container is defined by a file (e.g. Dockerfile) that the user/developer/operator defines. How can a vulnerability get into that file?
Topic 3 - Is it up to the CI/CD system or host OS (where the container runs) or container orchestrator (e.g. Kubernetes) or container registry to figure out if a vulnerability exists?
Topic 4 - How do most container registries today manage vulnerability lists, container scanning and potential mitigations? What are the difficult parts of those tasks?
Topic 5 - Most containers today are Linux containers. Are you seeing anything happening (yet) around how to manage Windows containers vulnerabilities? Is the assumption that Microsoft will fix this through one of their existing tools, or are things happening in the open source community as well?
Feedback?
- Email: PodCTL at gmail dot com
- Twitter: @PodCTL
- Web: http://podctl.com
89 episodes
Manage episode 204322881 series 2285897
Show: 32
Show Overview:Tyler and Aaron Delp talk with Liz Rice (@lizrice, Technology Evangelist @AquaSecTeam) about what's easy—and what's not—about finding and patching security vulnerabilities in containers. This is a cross-over show with @TheCloudcastNet podcast.
Show Notes:
- Liz’s talk at Velocity Conf - “What’s so hard about container vulnerability scanning?”
- Use code CLOUD to get 20% off Velocity or OSCON tickets
- Aqua Security Homepage
- Liz Rice’s Blog
- [Video] Kubernetes, Metadata and You (KubeCon 2017 Austin)
Topic 1 - Welcome to the show Liz. Tell us a little bit about your background and the types of things that you’re working on these days.
Topic 2 - Let’s start with the basics. A container is defined by a file (e.g. Dockerfile) that the user/developer/operator defines. How can a vulnerability get into that file?
Topic 3 - Is it up to the CI/CD system or host OS (where the container runs) or container orchestrator (e.g. Kubernetes) or container registry to figure out if a vulnerability exists?
Topic 4 - How do most container registries today manage vulnerability lists, container scanning and potential mitigations? What are the difficult parts of those tasks?
Topic 5 - Most containers today are Linux containers. Are you seeing anything happening (yet) around how to manage Windows containers vulnerabilities? Is the assumption that Microsoft will fix this through one of their existing tools, or are things happening in the open source community as well?
Feedback?
- Email: PodCTL at gmail dot com
- Twitter: @PodCTL
- Web: http://podctl.com
89 episodes
All episodes
×
1 S2:E2 - What challenges can Kubernetes solve? 11:24

1 S2:E7 - What skills are needed for Kubernetes? 13:39

1 Introduction to Java Quarkus for Kubernetes 29:00

1 KubeCon NA 2019 Contributor Summit & Event Preview 25:11

1 Building a Cloud-native Kubernetes Platform 37:28
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.