Theater Hall - E.T.I. (HiP main stage)

Update on Kubernetes Security in Critical Infrastructure

HIP - Track 1 - Room 5
Thomas Fricke
We summarize howto secure Kubernetes clusters in critical infrastructure and give insights from the machine rooms.
Cloud native technology has made its way into critical infrastructure. Controlling transmission grids, energy stock exchanges and in the future government applications gets closer and closer to the way how the big providers are running applications in their public cloud. However, for security reasons expressed in regulation and standards require air gapped environments. The talks describes the architecture of applications designed for this kind of environments, how they are developed and updated and secured. The author discusses regulations, especially of the German BSI, CIS, NIST, what is there and what is missing and must be adapted from international standards. These kind of use cases assume a certain maturity of K8S, we check what has improved in the last year and what is still missing. The talk contains more than traces of DevSecOps, GitOps and code signing. ~Hacking~ Trainings examples are available at https://github.com/thomasfricke/training-kubernetes-security

Additional information

Live Stream https://streaming.media.ccc.de/jev22/hip1
Type Talk/panel 45 min + 10 min Q&A (55 Minuten)
Language English

More sessions

12/27/22
Theater Hall - E.T.I. (HiP main stage)
HIP - Track 1 - Room 5
Welcome to Hacking in Parallel. Lets fire this up.
12/27/22
Theater Hall - E.T.I. (HiP main stage)
pandzillophon
HIP - Track 1 - Room 5
We'll look at the role IT and software play in modern manufacturing, with a twist on the semiconductor industry. Since I'm a security guy, we'll mostly focus on the sorry state of that.
12/27/22
Theater Hall - E.T.I. (HiP main stage)
HIP - Track 1 - Room 5
Das US-Militär hat massenhaft Geräte zur biometrischen Erfassung von Menschen in Afghanistan genutzt. Einige Geräte wurden beim hastigen Abzug der NATO-Truppen zurückgelassen. Wir haben bei Analysen solcher Geräte große Mengen an biometrischen und weiteren personenbezogenen Daten gefunden. In den falschen Händen bedeuten diese Daten Lebensgefahr für Menschen in Afghanistan und Irak.
12/27/22
Theater Hall - E.T.I. (HiP main stage)
Mate Soos
HIP - Track 1 - Room 5
In IT security we have been preoccupied with failures, with things that go wrong, and so we count the negatives -- the times when we failed. How about we seriously started counting the positives? More importantly, what if by adding more and more constraints to avoid the holes we have found, we are also removing the positive capacities in the system, thereby hurting our chance of success more than we hurt our chance of failure? In this talk, I will try to highlight how IT security could be done ...
12/27/22
Theater Hall - E.T.I. (HiP main stage)
Ilja van Sprundel
HIP - Track 1 - Room 5
The C programming language first appeared in 1972 and became enormously popular. It has this magical combination of features that allows developers to quickly write portable code that can be reused and easily ported to different architectures. It has been the foundation of most operating systems and systems programming in the past 50 years.
12/27/22
Theater Hall - E.T.I. (HiP main stage)
Matthias Monroy
HIP - Track 1 - Room 5
The "Enhanced Border Security Partnership" poses an unprecedented threat to civil liberties in Europe.
12/27/22
Theater Hall - E.T.I. (HiP main stage)
mc.fly
HIP - Track 1 - Room 5
I wil talk why perimeter security is no longer a useful security principle, what could replace it and how to migrate