Loading…
May 10-12, 2023
Vancouver, British Columbia, Canada + Virtual
View More Details & Registration
Note: The schedule is subject to change.

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Open Source Summit North America 2023 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Pacific Daylight Time (UTC/GMT -8). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date."

IMPORTANT NOTE: Timing of sessions and room locations are subject to change.

Friday, May 12 • 11:55am - 12:35pm
Never Break the Chain: Securing the Container Supply Chain with Notary, TUF, and Gatekeeper - Katie Novotny & Diego Casati, Microsoft

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
Recently we have seen challenges in the global consumer supply chain while the SolarWinds hack highlighted software supply chain weakness. The lack of software supply chain security has become a common attack vector for malicious code. When working with containers, it is important to ensure that processes are secure and controlled and be mindful that this is a multifaceted concern. While we can use a number of tools to scan for vulnerabilities, using digital signatures is a great way to ensure your code is exactly what is intended. Today, we will compare different options for signing container images and work through a demo using Notary, Gatekeeper, and Ratify. Notary is an open source project designed on TUF (The Update Framework) which is a specification for managing trusted application code. Gatekeeper is a customizable admission webhook for Kubernetes that enforces policies executed by the Open Policy Agent (OPA). Ratify is a workflow engine that coordinates the verification of different supply chain objects for an image as per a given policy. We will show how to use these technologies in a typical CI/CD process including enforcement by policy in Kubernetes clusters. Will the hacker be able to get malicious code deployed to our clusters? Tune in to find out!

Speakers
avatar for Katie Novotny

Katie Novotny

Azure Global Black Belt Team Cloud Native Specialist, Microsoft
I am a Cloud Native Specialist on the Azure Global Black Belt Team at Microsoft. My focus is on App Innovation in technologies ranging from containers, microservices, Kubernetes, and Open Source solutions to low code and serverless and everything in-between. My technology career has... Read More →
avatar for Diego Casati

Diego Casati

App Innovation GBB Team, Microsoft



Friday May 12, 2023 11:55am - 12:35pm PDT
122 (Level 1)