Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
When DevOps goes wrong - An observation story
In recent years, the DevOps movement has grown massively in popularity.
For some it made life easier, for others there were no changes and for others it has become "worse" since then.
If you belong to the latter group and have ever thought that you are alone in this respect, you are wrong. Obviously, some of these deteriorations are due to the fact that DevOps is implemented "wrong" or inconsistently in the workplace.
This talk will give an overview of real life observations made in DevOps environments.
It might include some of the nice, some of the bad and some of the ugly solutions you might encounter.
πΊ ππΌ https://media.ccc.de/v/froscon2020-2587-when_devops_goes_wrong
#froscon2020 #ccc #devops #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
In recent years, the DevOps movement has grown massively in popularity.
For some it made life easier, for others there were no changes and for others it has become "worse" since then.
If you belong to the latter group and have ever thought that you are alone in this respect, you are wrong. Obviously, some of these deteriorations are due to the fact that DevOps is implemented "wrong" or inconsistently in the workplace.
This talk will give an overview of real life observations made in DevOps environments.
It might include some of the nice, some of the bad and some of the ugly solutions you might encounter.
πΊ ππΌ https://media.ccc.de/v/froscon2020-2587-when_devops_goes_wrong
#froscon2020 #ccc #devops #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Forwarded from BlackBox (Security) Archiv
Media is too big
VIEW IN TELEGRAM
seccomp β Your Next Layer of Defense
Why should you allow all possible system calls from your application when you know that you only need some? If you have ever wondered the same then this is the right talk for you.
ππΌ We are covering:
* What is seccomp in a nutshell and where could you use it.
* Practical example with Docker, Elasticsearch, and Beats.
* How to collect seccomp violations with Auditd.
Because your security approach can always use an additional layer of protection.
πΊ ππΌ https://media.ccc.de/v/froscon2020-2614-seccomp_your_next_layer_of_defense
#froscon2020 #ccc #seccomp #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
Why should you allow all possible system calls from your application when you know that you only need some? If you have ever wondered the same then this is the right talk for you.
ππΌ We are covering:
* What is seccomp in a nutshell and where could you use it.
* Practical example with Docker, Elasticsearch, and Beats.
* How to collect seccomp violations with Auditd.
Because your security approach can always use an additional layer of protection.
πΊ ππΌ https://media.ccc.de/v/froscon2020-2614-seccomp_your_next_layer_of_defense
#froscon2020 #ccc #seccomp #video
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag