The state of your supply chain
In Andrew Martin’s session, learn about supply chain tools like Grafeas, Kritis, in-toto, Clair, Micro Scanner, TUF, and Notary. Catch a demonstration on how to gate container image pipelines and deployments on cryptographically verified supply chain metadata.
Container security often focuses on runtime best-practices while neglecting delivery of the software in the supply chain. Application, library, and OS vulnerabilities are a likely route to data exfiltration; emerging technologies in the container ecosystem offer a new opportunity to mitigate this risk. Treating containers as immutable artifacts and injecting configuration allows us to “upgrade” images by rebuilding and shipping whole software bundles, avoiding configuration drift and state inconsistencies. This makes it possible to constantly patch software, and to easily enforce governance of artifacts both pre- and post-deployment.
In this talk, we detail an ideal, security-hardened container supply chain, describe the current state of the ecosystem, and dig into specific tools like Grafeas, Kritis, in-toto, Clair, Micro Scanner, TUF, and Notary. We’ll also demo how to gate container image pipelines and deployments on cryptographically verified supply chain metadata.
Andrew Martin has a strong test-first engineering ethos gained architecting and deploying high-traffic web applications. Proficient in systems development, testing, and operations, he is comfortable profiling and securing every tier of a bare metal or cloud native application, and has battle-hardened experience delivering containerised solutions to enterprise clients. He is a co-founder at https://control-plane.io