Securing the Superpowers: Who Loaded That eBPF Program?
CNCF [Cloud Native Computing Foundation] via YouTube
Learn AI, Data Science & Business — Earn Certificates That Get You Hired
Start speaking a new language. It’s just 3 weeks away.
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the critical aspects of eBPF security in this informative conference talk from KubeCon + CloudNativeCon Europe. Delve into the powerful capabilities of eBPF technology and its widespread adoption across various platforms, including Linux distributions, cloud environments, and even Windows. Discover the potential security risks associated with eBPF's extensive access to kernel data structures and networking packets. Learn about the Linux kernel community's efforts to develop a robust solution for monitoring and enforcing eBPF program loading. Gain insights into the design of eBPF auditing and security measures, with a practical demonstration using Tetragon, an open-source eBPF-based security tool. Understand how to restrict eBPF program loading, create comprehensive audit logs, and implement time series databases for enhanced security tracking. Equip yourself with the knowledge to address crucial security questions and protect your systems from potential eBPF-related vulnerabilities.
Syllabus
Securing the Superpowers: Who Loaded That EBPF Program? - John Fastabend & Natalia Reka Ivanko
Taught by
CNCF [Cloud Native Computing Foundation]