The Cloudcast

The Cloudcast (@cloudcastpod) is the industry's #1 Cloud Computing podcast, and the place where Cloud meets AI.  Co-hosts Aaron Delp (@aarondelp) & Brian Gracely (@bgracely) speak with technology and business leaders that are shaping the future of business. Topics will include Cloud Computing | AI | AGI | ChatGPT | Open Source | AWS | Azure | GCP | Platform Engineering | DevOps | Big Data | ML | Security | Kubernetes | AppDev | SaaS | PaaS . 

https://www.thecloudcast.net

subscribe
share






The Cloudcast #343 - Container Vulnerability Scanning


Aaron and Tyler Britten talk with Liz Rice (@lizrice, Technology Evangelist @AquaSecTeam) about what's easy—and what's not—about finding and patching security vulnerabilities in containers. This is a cross-over show with @PodCTL podcast.

Show Links:

  • Liz’s talk at Velocity Conf - “What’s so hard about container vulnerability scanning?”
  • Use code "CLOUD" to get 20% off Velocity and OSCON Conference Passes
  • Aqua Security Homepage
  • Liz Rice’s Blog
  • [Video] Kubernetes, Metadata and You (KubeCon 2017 Austin)
  • [PODCAST] @PodCTL - Containers | Kubernetes | OpenShift - RSS Feed, iTunes, Google Play, Stitcher, TuneIn and all your favorite podcast players
  • [A CLOUD GURU] Get The Cloudcast Alexa Skill
  • [A CLOUD GURU] A Cloud Guru Membership - Start your free trial. Unlimited access to the best cloud training and new series to keep you up-to-date on all things AWS.
  • [A CLOUD GURU] FREE access to AWS Certification Exam Prep Guide - At A Cloud Guru, the #1 question received from students is "I want to pass the AWS cert exam, so where do I start?" This course is your answer.
  • [FREE] eBook from O'Reilly

Show Notes
  • Topic 1 - Welcome to the show Liz. Tell us a little bit about your background and the types of things that you’re working on these days.
  • Topic 2 - Let’s start with the basics. A container is defined by a file (e.g. Dockerfile) that the user/developer/operator defines. How can a vulnerability get into that file?
  • Topic 3 - Is it up to the CI/CD system or  host OS (where the container runs) or container orchestrator (e.g. Kubernetes) or container registry to figure out if a vulnerability exists?
  • Topic 4 - How do most container registries today manage vulnerability lists, container scanning and potential mitigations? What are the difficult parts of those tasks?
  • Topic 5 - Most containers today are Linux containers. Are you seeing anything happening (yet) around how to manage Windows containers vulnerabilities? Is the assumption that Microsoft will fix this through one of their existing tools, or are things happening in the open source community as well?
    Feedback?
    • Email: show at thecloudcast dot net
    • Twitter: @thecloudcastnet and @ServerlessCast


    fyyd: Podcast Search Engine
    share








     April 19, 2018  25m