eBPF for Creating Least Privileged Policies - Implementing Security Through Kernel Monitoring
CNCF [Cloud Native Computing Foundation] via YouTube
2,000+ Free Courses with Certificates: Coding, AI, SQL, and More
Google, IBM & Microsoft Certificates — All in One Plan
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Watch a technical conference talk exploring how eBPF technology enables the implementation of least privileged policies through kernel code injection while maintaining minimal application overhead. Learn from security experts as they demonstrate eBPF-based least privileged policies against known CVEs through live demonstrations. Discover how eBPF monitors process execution, system calls, networking, file access, and stack traces to establish known ordering patterns that significantly enhance security measures. Gain insights into the technology's strengths and ongoing developments aimed at preventing future security attacks, with practical examples of implementing the least privilege principle in cloud native environments.
Syllabus
eBPF for Creating Least Privileged Policies; What Do I Need... Natalia Reka Ivanko & John Fastabend
Taught by
CNCF [Cloud Native Computing Foundation]