Loading…
September 27-30, 2021
Seattle, Washington, USA + Virtual
View More Details & Registration

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Open Source Summit + Embedded Linux Conference + OSPOCon 2021 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Pacific Daylight Time (UTC -7). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date." The schedule is subject to change.

IMPORTANT NOTE: Timing of sessions and room locations are subject to change.

Cloud Infrastructure [clear filter]
Monday, September 27
 

3:50pm PDT

(VIRTUAL) Dynamic Authorization and Policy Control for Your Kubernetes Cluster - Ash Narkar, Styra, Inc
When you adopt Kubernetes for production, how do you, a cluster administrator, enforce requirements from security and compliance teams? Like most systems, you put guardrails on the cluster to limit how teams (ab)use the cluster, but with Kubernetes those guardrails look quite different because Kubernetes differentiates runtime-state (what is actually happening) and desired-state (what is supposed to happen). Treating desired-state as separate from runtime enables you to put guardrails on the instructions developers give to Kubernetes and in so doing avoid runtime problems even before they happen. Kubernetes is simply too flexible to hand over to even relatively small teams without basic guardrails like ensuring images are pulled from trusted repositories. We discuss the mechanism the Kubernetes team developed to make it feasible to add desired-state security policies: Admission Control and we will also show how the Open Policy Agent(OPA) provides a declarative approach to Admission Control to enforce custom policies on Kubernetes objects without modifying any Kubernetes components. Finally, we will end with a list of architectural best practices and we hope that our audience will be able to leverage OPA for implementing desired-state security policies for the Kubernetes API.

Speakers
avatar for Ash Narkar

Ash Narkar

Software Engineer, Styra
Ash Narkar is a maintainer of the Open Policy Agent project. Ash has over 5 years of experience working on large-scale distributed systems. Ash is a Senior Software Engineer at Styra, Inc. working on OPA development and integrations. Previously he was a Principal Engineer at Verizon... Read More →


Monday September 27, 2021 3:50pm - 4:40pm PDT
MeetingPlay Platform + Virtual Learning Lab
 
Tuesday, September 28
 

12:00pm PDT

(IN-PERSON) Kubernetes is Open by Default, Use Open Source to Secure - Alexander Lawrence, Sysdig
There’s a false sense that containerized applications are inherently secure. It is true that: - Containers can make your environment more secure. - Isolated, well-understood processes can have a smaller attack surface. - Cloud native solutions can offer more intelligent, more agile management than legacy infrastructure. Kubernetes brings many security advantages, due to the software-defined nature of the workloads. However, mistakes in configuration happen and vulnerabilities are always being discovered. In this session, we will discuss protecting different attack vectors of your cloud workloads and infrastructure by seeing how Cloud Custodian, Falco, Trivy, and KubeAudit help secure modern day workloads.

Speakers
AL

Alexander Lawrence

Principal Solutions Engineer, Sysdig
Alex Lawrence is a Principal Solutions engineer at Sysdig. Alex has an extensive history working in the datacenter as well as with the world of DevOps. Prior to moving into a solutions role, Alex spent a majority of his time working in the world of OSS on identity, authentication... Read More →


Tuesday September 28, 2021 12:00pm - 12:50pm PDT
Room 301

4:00pm PDT

(IN-PERSON) Zero-Trust Supply Chain Security with Sigstore, TektonCD and SPIFFE - Dan Lorenc, Google
Supply-chain security has lagged behind network and service security for years, but it's time to fix that! Zero-trust technologies have dramatically improved enterprise security, but haven't been applied to supply-chain security yet. Traditionally, workload security relied on trusted "perimeters". Firewalls, internal networks and physical security provided defense against attackers by keeping them out. This type of architecture is simple and effective when all assets are in one place, the firewall doesn't need many holes and all hardware is on the same physical network. This obviously isn't true today. The workplace is distributed. Devices are mobile and environments are ephemeral. Enter zero-trust security. Zero-trust focuses on protecting assets, not perimeters. Services authenticate users against hardware instead of network endpoints. Users authenticate with MFA and devices authenticate with hardware-roots-of-trust. The end result is a system focused on fine-grained access control. Instead of trusting everything on a network, you control exactly which users and systems have access to which services. This presentation explores how zero-trust can be applied to build systems **today**, with working demos of the Sigstore, TektonCD and SPIFFE/SPIRE projects.

Speakers
avatar for Dan Lorenc

Dan Lorenc

CEO, Chainguard
Dan has been working on and worrying about containers since 2015 as an engineer and manager.He started projects like Minikube, Skaffold, and Kaniko to make containers easy and fun, then got so worried about the state of OSS supply-chains he partnered up with Kim and others to f... Read More →


Tuesday September 28, 2021 4:00pm - 4:50pm PDT
Room 301
 
Wednesday, September 29
 

1:45pm PDT

(VIRTUAL) Lessons from Running One of the Largest CTFs - Stephane Graber, Canonical Ltd.
NorthSec started as a yearly on-site Capture The Flag security event in Montreal. Over the years, it has grown to close to a thousand attendees representing as many as 80 teams, while also developing a large conference and a selection of professional trainings on the side. This 3 day CTF is somewhat unique for providing a completely distinct infrastructure for each participating team. In theory making it impossible for one team to affect any of the others. All while providing sometimes hundreds of different virtual servers and services for a team to attack. Providing all of that, to every team, in a reliable, fair and safe way has at times been a bit of a struggle. This talk will be going over the past few editions, looking both at the infrastructure used to provide the CTF and how it evolved as well as the various bugs and configuration issues that were encountered. This covers all kind of interesting problems, Linux kernel bugs, container namespacing issues, resource limits working in odd ways, information leakage and network and storage tuning. Those lessons are in no way specific to operating a CTF and should be of interest for anyone running a very large set of containers in production, especially when untrusted and/or malicious users are involved!

Speakers
avatar for Stephane Graber

Stephane Graber

Project leader for LXD, Canonical Ltd.
StĂ©phane Graber is the upstream project leader for LXC and LXD at Canonical and a frequent speaker and track leader at events related to containers and Linux. StĂ©phane is a longtime contributor to the Ubuntu Linux distribution as an Ubuntu core developer and previous Ubuntu technical... Read More →



Wednesday September 29, 2021 1:45pm - 2:35pm PDT
MeetingPlay Platform + Virtual Learning Lab
  Cloud Infrastructure, Container & Infrastructure Security

4:55pm PDT

(VIRTUAL) Zero Trust Cloud VPN Based on VPP and WireGuard - Hongjun Ni & Fan Zhang, Intel
Users, devices, applications and data are moving outside traditional enterprise perimeter. A successful digital transformation demands a zero trust security model. This presentation will introduce a Zero Trust, Scalable Cloud VPN based on VPP and WireGuard, which shows high performance, scalability and end-to-end security. It can be used as K8s Cloud VPN and Edge VPN. This topic will cover below key points: 1) Implements a Zero Trust software Cloud VPN on VPP. 2) Implements VPP-based WireGuard protocol with high performance. 3) Leverages IPsec-MB library/AVX512 vector instructions and cryptographic hardware offloading to accelerate Wireguard HASH functions and Chacha20-Poly1305 cryptographic operations. 4) Service Discovery and Key Management to build up zero trust networking automatically.

Speakers
FZ

Fan Zhang

VPP and DPDK Crypto Tech lead, Intel
Zhang Fan, born in Changsha, Hunan province, holds a PhD. in Network Information Security from University of Limerick. He is now a network software engineer in Intel Ireland. Fan has published 3 international journals and conference papers indexed by SCI/EI and is one of the authors... Read More →
avatar for Hongjun Ni

Hongjun Ni

Technical Leader, Intel
Hongjun Ni has been focusing on Cloud Networking and Network Security. He is FD.io VPP Maintainer, UDPI Project Lead, Sweetcomb Project Lead and NSH_SFC Project Lead. He has fifteen years' rich experience on Cloud Networking, Network Security, SmartNIC and Wireless. He has given 20... Read More →



Wednesday September 29, 2021 4:55pm - 5:45pm PDT
MeetingPlay Platform + Virtual Learning Lab
 

Twitter Feed

Filter sessions
Apply filters to sessions.
  • 101 Essentials - Cloud Administration
  • 101 Essentials - Embedded Linux
  • 101 Essentials - Linux Administration
  • AI & Data
  • Case Studies
  • Cloud Infrastructure
  • Cloud Native Development
  • Community Management & Leadership
  • Diversity Summit hosted by Google
  • Embedded Linux Conference (ELC)
  • Internet of Things
  • Keynote Sessions
  • Linux Systems
  • OS Databases
  • OS Dependability
  • OSPOCon
  • Project Highlights
  • Project Mini-Summits
  • Special Events / Exhibits / Breaks
  • Wildcard