● kubectl as the cli tool
● More deployment definitions ie pods, svc,
deployments
● Plug and play networking with CNI
Kubernetes
Slide 13
Slide 13 text
In Docker EE you can swap and change
Slide 14
Slide 14 text
Live demo time
Slide 15
Slide 15 text
Now for the fun stuff secops with
Kubernetes
Slide 16
Slide 16 text
Real life attacks
Slide 17
Slide 17 text
https://www.fortinet.com/blog/threat-research/yet-another-
crypto-mining-botnet.html
https://github.com/docker/hub-feedback/issues/1121
This attack allowed the hackers to gain access to your
Docker host via a vulnerable image.
Hackers going to hack
Slide 18
Slide 18 text
Hackers going to hack
Slide 19
Slide 19 text
How do we protect from this threat ?
Slide 20
Slide 20 text
Secure Supply Chain
Slide 21
Slide 21 text
Secure Supply Chain
TEST STAGING
•
Signature
verification
•
Native encryption
Scanning Signing
Automated
Policies
Docker for Mac
or
Docker for Windows
PRODUCTION
Slide 22
Slide 22 text
No content
Slide 23
Slide 23 text
Production Environments
Docker Trusted Registry
Docker UCP
Production Environments
Version Control
Docker UCP
Non-Production Environments
Developer Machine
Development CI/CD Operations
Datacenter 1
Datacenter 2
Docker Trusted Registry
Docker for
Secure Supply Chain
Slide 24
Slide 24 text
CI Workflow
Docker Trusted
Registry
Build container
$ git clone
$ mvn deploy
Repository
Manager
binaries
Version Control
src
Dockerfiles
docker-compose.yml
files
pull
push
CI Agent
$ docker run -it
--rm builder build
runs
build
start
CI Agent
$ git clone
$ docker build -t myapp
$ docker push myapp
push
pull
CI Agent
$ eval $(
You don't have to chose one
apiVersion: v1
kind: Pod
metadata:
name: my-dockercon-app
spec:
securityContext:
runAsUser: 1000
readOnlyRootFilesystem: true
allowPrivilegeEscalation: false
Slide 34
Slide 34 text
No content
Slide 35
Slide 35 text
A great blog post on this stuff
https://blog.jessfraz.com/post/containers-security-and-echo-chambers/