SlideShare a Scribd company logo
KubeHuddle NA 2023 - Why should devs care about container security - Eric Smalling.pdf
Eric Smalling
● Senior Developer Advocate @ Snyk
● Based in Dallas/Fort Worth, Texas
● 20+ years enterprise software development
● 10+ years build/test/deploy automation (CI/CD)
● Docker user since 2013 (v0.6)
● Docker Captain
● CKA, CKAD & CKS Certified
@ericsmalling
Container Challenges
Historically, developers have
owned the security posture of their
own code and the libraries used.
Containers add security concerns
at the operating-system level such
as base-image selection, package
installation, user and file
permissions, and more.
Increased Scope of
Responsibility
These additional technologies used
to be owned by other teams such
as system engineers or middleware
teams. Many developers have
never had to deal with securing
these layers of the stack.
Lack of Expertise
While shifting security left adds
responsibilities to developer teams,
the business owners have
expectations that pipeline velocity
will not be negatively impacted.
Maintaining Velocity
Ownership of
developers
What does my service contain?
● Source code of my app
● 3rd party dependencies
● Dockerfile
● IaC files (eg. Terraform)
● K8s files
Enough Slides.
Demo Time!
Defence
in Depth
Further practices
and tech to
consider.
Images
Runtime
Kubernetes
Defence
in Depth
Further practices
and tech to
consider.
Images
Runtime
Kubernetes
Minimize Footprint
Don’t give hackers more tools to expand their exploits
Layer Housekeeping
Understand how layers work at build and run-time
Build strategies
Multi-Stage, repeatable builds, standardized labeling,
alternative tools
Secure Supply Chain
Know where images come from.
Only CI should push to registries.
Defence
in Depth
Further practices
and tech to
consider.
Images
Runtime
Kubernetes
Don’t run as root
You probably don’t need it.
Privileged Containers
You almost definitely don’t need it.
Drop capabilities
Most apps don’t need even Linux capabilities;
dropping all and allow only what’s needed.
Read Only Root Filesystem
Immutability makes exploiting your container harder.
Deploy from known sources
Pull from known registries only.
Defence
in Depth
Further practices
and tech to
consider.
Images
Runtime
Kubernetes
Secrets
Use them but make sure they’re encrypted and have
RBAC applied
RBAC
Hopefully everybody is using this.
SecurityContext
Much of the Runtime practices mentioned can be
enforced via SC
Network Policy
Start with zero-trust and add allow rules only as
necessary.
Enforcement
Use OPA (Gatekeeper), Kyverno, etc
Key Takeaways
Just like unit tests, fast, actionable
security feedback is critical.
Working security into a developer’s
workflow without slowing them
down drives adoption.
Feedback Loop
Giving developers tools that
provide actionable information can
allow them to deal with security
issues as they are introduced.
Empower developers
to be proactive
Implementing known secure
practices for building and running
your container images and IaC
configurations can mitigate
vulnerabilities that slip into
deployments as well as zero-day
vulnerabilities that may exist.
Defence in depth
References:
● Kubernetes SecurityContext Cheatsheet: https://snyk.co/udW5K
● Dockerfile Best Practices: https://docs.docker.com/develop/develop-images/dockerfile_best-practices
● Using multi-stage builds: https://docs.docker.com/develop/develop-images/multistage-build
● OPA Gatekeeper: https://open-policy-agent.github.io/gatekeeper/website/docs
● Kyverno: https://kyverno.io
● PodSecurityPolicy Deprecation: Past, Present, and Future: https://kubernetes.io/blog/2021/04/06/podsecuritypolicy-deprecation-past-present-and-future
● CNCF Certification Curriculum: https://github.com/cncf/curriculum
● Snyk Kubernetes “Quick hit” videos: https://youtube.com/playlist?list=PLQ6IC7glz4-UA4uKQOhmAxh6Mhvr3m4g-
Thank you!
@ericsmalling

More Related Content

PDF
GDG SLK - Why should devs care about container security.pdf
PDF
Hacking into your containers, and how to stop it!
PDF
Python Web Conference 2022 - Why should devs care about container security.pdf
PDF
ATO 2022 - Why should devs care about container security.pdf
PDF
Container Stranger Danger - Why should devs care about container security
PDF
Why Should Developers Care About Container Security?
PDF
DevSecCon Lightning 2021- Container defaults are a hackers best friend
PDF
Why should developers care about container security?
GDG SLK - Why should devs care about container security.pdf
Hacking into your containers, and how to stop it!
Python Web Conference 2022 - Why should devs care about container security.pdf
ATO 2022 - Why should devs care about container security.pdf
Container Stranger Danger - Why should devs care about container security
Why Should Developers Care About Container Security?
DevSecCon Lightning 2021- Container defaults are a hackers best friend
Why should developers care about container security?

Similar to KubeHuddle NA 2023 - Why should devs care about container security - Eric Smalling.pdf (20)

PDF
LFX Nov 16, 2021 - Find vulnerabilities before security knocks on your door
PDF
AWS live hack: Docker + Snyk Container on AWS
PPTX
Docker best Practices
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PPTX
Tips and best practices for Docker
PPTX
Hacking DevOps
PDF
Terrascan - Cloud Native Security Tool
PPT
2011 NASA Open Source Summit - Forge.mil
PDF
Testing infrastructure as code
PDF
Cncf checkov and bridgecrew
PDF
Docker Containers Security
PDF
Tampere Docker meetup - Happy 5th Birthday Docker
PPTX
Security Practices in Kubernetes
PDF
DockerCon SF 2015: Faster, Cheaper, Safer
PDF
Shift Right Security for EKS Webinar Slides
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
PDF
Security Patterns for Microservice Architectures
PDF
Security Patterns for Microservice Architectures - SpringOne 2020
PDF
Docker Birthday #5 Meetup Cluj - Presentation
PPTX
Implementing Fast IT Deploying Applications at the Pace of Innovation
LFX Nov 16, 2021 - Find vulnerabilities before security knocks on your door
AWS live hack: Docker + Snyk Container on AWS
Docker best Practices
AWS live hack: Atlassian + Snyk OSS on AWS
Tips and best practices for Docker
Hacking DevOps
Terrascan - Cloud Native Security Tool
2011 NASA Open Source Summit - Forge.mil
Testing infrastructure as code
Cncf checkov and bridgecrew
Docker Containers Security
Tampere Docker meetup - Happy 5th Birthday Docker
Security Practices in Kubernetes
DockerCon SF 2015: Faster, Cheaper, Safer
Shift Right Security for EKS Webinar Slides
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Security Patterns for Microservice Architectures
Security Patterns for Microservice Architectures - SpringOne 2020
Docker Birthday #5 Meetup Cluj - Presentation
Implementing Fast IT Deploying Applications at the Pace of Innovation
Ad

More from Eric Smalling (11)

PDF
DockerCon 2023 - Live Demo_Hardening Against Kubernetes Hacks.pdf
PDF
KubeCon NA 2022 - Hardening against Kubernetes Hacks.pdf
PDF
DevOpsDays Chicago 2022 - Hands-on hacking containers and ways to prevent it
PDF
Look Ma' - Building Java and Go based container images without Dockerfiles
PDF
SCaLE 19x - Eric Smalling - Hardening against Kubernetes Hacks
PDF
DockerCon 2022 - From legacy to Kubernetes, securely & quickly
PDF
So. many. vulnerabilities. Why are containers such a mess and what to do abou...
PDF
IBM Index 2018 Conference Workshop: Modernizing Traditional Java App's with D...
PDF
Best Practices for Developing & Deploying Java Applications with Docker
PDF
Docker 101 Workshop slides (JavaOne 2017)
PPTX
Simply your Jenkins Projects with Docker Multi-Stage Builds
DockerCon 2023 - Live Demo_Hardening Against Kubernetes Hacks.pdf
KubeCon NA 2022 - Hardening against Kubernetes Hacks.pdf
DevOpsDays Chicago 2022 - Hands-on hacking containers and ways to prevent it
Look Ma' - Building Java and Go based container images without Dockerfiles
SCaLE 19x - Eric Smalling - Hardening against Kubernetes Hacks
DockerCon 2022 - From legacy to Kubernetes, securely & quickly
So. many. vulnerabilities. Why are containers such a mess and what to do abou...
IBM Index 2018 Conference Workshop: Modernizing Traditional Java App's with D...
Best Practices for Developing & Deploying Java Applications with Docker
Docker 101 Workshop slides (JavaOne 2017)
Simply your Jenkins Projects with Docker Multi-Stage Builds
Ad

Recently uploaded (20)

PDF
System and Network Administration Chapter 2
PDF
System and Network Administraation Chapter 3
PDF
Digital Strategies for Manufacturing Companies
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Nekopoi APK 2025 free lastest update
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPT
Introduction Database Management System for Course Database
System and Network Administration Chapter 2
System and Network Administraation Chapter 3
Digital Strategies for Manufacturing Companies
ManageIQ - Sprint 268 Review - Slide Deck
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Operating system designcfffgfgggggggvggggggggg
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Wondershare Filmora 15 Crack With Activation Key [2025
Design an Analysis of Algorithms I-SECS-1021-03
Nekopoi APK 2025 free lastest update
VVF-Customer-Presentation2025-Ver1.9.pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Softaken Excel to vCard Converter Software.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
How to Migrate SBCGlobal Email to Yahoo Easily
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
2025 Textile ERP Trends: SAP, Odoo & Oracle
Odoo POS Development Services by CandidRoot Solutions
Introduction Database Management System for Course Database

KubeHuddle NA 2023 - Why should devs care about container security - Eric Smalling.pdf

  • 2. Eric Smalling ● Senior Developer Advocate @ Snyk ● Based in Dallas/Fort Worth, Texas ● 20+ years enterprise software development ● 10+ years build/test/deploy automation (CI/CD) ● Docker user since 2013 (v0.6) ● Docker Captain ● CKA, CKAD & CKS Certified @ericsmalling
  • 3. Container Challenges Historically, developers have owned the security posture of their own code and the libraries used. Containers add security concerns at the operating-system level such as base-image selection, package installation, user and file permissions, and more. Increased Scope of Responsibility These additional technologies used to be owned by other teams such as system engineers or middleware teams. Many developers have never had to deal with securing these layers of the stack. Lack of Expertise While shifting security left adds responsibilities to developer teams, the business owners have expectations that pipeline velocity will not be negatively impacted. Maintaining Velocity
  • 4. Ownership of developers What does my service contain? ● Source code of my app ● 3rd party dependencies ● Dockerfile ● IaC files (eg. Terraform) ● K8s files
  • 6. Defence in Depth Further practices and tech to consider. Images Runtime Kubernetes
  • 7. Defence in Depth Further practices and tech to consider. Images Runtime Kubernetes Minimize Footprint Don’t give hackers more tools to expand their exploits Layer Housekeeping Understand how layers work at build and run-time Build strategies Multi-Stage, repeatable builds, standardized labeling, alternative tools Secure Supply Chain Know where images come from. Only CI should push to registries.
  • 8. Defence in Depth Further practices and tech to consider. Images Runtime Kubernetes Don’t run as root You probably don’t need it. Privileged Containers You almost definitely don’t need it. Drop capabilities Most apps don’t need even Linux capabilities; dropping all and allow only what’s needed. Read Only Root Filesystem Immutability makes exploiting your container harder. Deploy from known sources Pull from known registries only.
  • 9. Defence in Depth Further practices and tech to consider. Images Runtime Kubernetes Secrets Use them but make sure they’re encrypted and have RBAC applied RBAC Hopefully everybody is using this. SecurityContext Much of the Runtime practices mentioned can be enforced via SC Network Policy Start with zero-trust and add allow rules only as necessary. Enforcement Use OPA (Gatekeeper), Kyverno, etc
  • 10. Key Takeaways Just like unit tests, fast, actionable security feedback is critical. Working security into a developer’s workflow without slowing them down drives adoption. Feedback Loop Giving developers tools that provide actionable information can allow them to deal with security issues as they are introduced. Empower developers to be proactive Implementing known secure practices for building and running your container images and IaC configurations can mitigate vulnerabilities that slip into deployments as well as zero-day vulnerabilities that may exist. Defence in depth
  • 11. References: ● Kubernetes SecurityContext Cheatsheet: https://snyk.co/udW5K ● Dockerfile Best Practices: https://docs.docker.com/develop/develop-images/dockerfile_best-practices ● Using multi-stage builds: https://docs.docker.com/develop/develop-images/multistage-build ● OPA Gatekeeper: https://open-policy-agent.github.io/gatekeeper/website/docs ● Kyverno: https://kyverno.io ● PodSecurityPolicy Deprecation: Past, Present, and Future: https://kubernetes.io/blog/2021/04/06/podsecuritypolicy-deprecation-past-present-and-future ● CNCF Certification Curriculum: https://github.com/cncf/curriculum ● Snyk Kubernetes “Quick hit” videos: https://youtube.com/playlist?list=PLQ6IC7glz4-UA4uKQOhmAxh6Mhvr3m4g- Thank you! @ericsmalling