Möchten Sie mit Ihrem Team teilnehmen? Profitieren Sie von unseren Gruppenrabatten! Schreiben Sie an events@dpunkt.de

In a Container Nobody Can Hear You Scream: Next Generation Process Isolation

Is it ever safe to run untrusted code in containers? Should process isolation keep workloads in, or attackers out? What would it take to run a malware test lab in Kubernetes?

With fast startup times and consistent execution environments containers beat traditionally slow, monolithic VMs — but with the advancement of micro VMs the boundaries have become blurred. It is increasingly difficult to know which isolation technology to choose for our next application. Can we run different workloads in different "container" types — on the same cluster?

In this talk we:

* examine the history of trying to safely run unsafe processes
* compare and contrast the emerging generation of process isolation and security techniques
* rationalise the design decisions that drive each project
* learn about what workloads are best suited to run in each technology

Lernziele

Attendees will learn how and when to use different container and Kubernetes-compatible virtual machine isolation technologies. They will understand how to select workloads for each type of isolation technology, and the benefits and challenges of implementing each.

 

Speaker

 

Andrew Martin
Andrew Martin has an incisive security engineering ethos gained building and destroying high-traffic web applications. Proficient in systems development, testing, and operations, he is comfortable profiling and securing every tier of a bare metal or cloud native system, and has battle-hardened experience delivering containerised solutions to enterprise and government. He is a co-founder at https://control-plane.io.

Sponsoren

Platin
New Relic
QAware
Microsoft Azure
Gold
Palo Alto Networks
Elastic
SNYK
codecentric

CLC-Newsletter

Sie möchten über die Continuous Lifecycle
auf dem Laufenden gehalten werden?

 

Anmelden