Loading…
October 25, 2022 | Detroit, Michigan
View More Details & Registration Information
 

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for KubeCon + CloudNativeCon North America 2022 - Detroit, MI + Virtual and add this Co-Located event to your registration to participate in these sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in Eastern Daylight Time (EDT), UTC -4. To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date."

The schedule is subject to change.
Sessions [clear filter]
Tuesday, October 25
 

9:45am EDT

Platform Driven Compliance with Sigstore at Autodesk - Jesse Sanford, Autodesk
 Autodesk has a long history of producing software that commercial entities use to build and make the world around us. Trust in our software is critical to our success, and as we move to government sales, that has never been more true. Additionally, Autodesk’s software is now more than ever a hybrid of desktop and cloud based solutions. We must build and deploy software to both end user machines and public clouds. Existing software supply chain solutions must be augmented to meet these new system models and secure them wherever they live. In this talk Jesse Sanford will review how Autodesk is adapting it’s existing CI and CD tooling with the Sigstore project to meet current and future compliance needs. Jesse will speak in detail about the container provenance tracking solution built on Cosign with InToto vuln scanning attestations. A demo of our deployment governance solution will be shown which will block out of policy images from being allowed through the CD pipelines. If there is time, I will go into our future plans to implement a machine Identity solution with SPIRE for keyless signing with Cosign, Fulcio and Rekor.

Speakers
avatar for Jesse Sanford

Jesse Sanford

Software Architect, Autodesk
Jesse is a lifelong software engineer focused on site reliability and Infosec. Currently architecting the juncture of platform engineering and security/compliance for Autodesk's Developer Enablement team. He regularly contributes to open source and frequently speaks about his work... Read More →



Tuesday October 25, 2022 9:45am - 10:10am EDT
Room 430 A

10:30am EDT

Who's Verifying Your Signatures? Approaching Private Container Image Signing - Ethan Lowman, Datadog
By some estimates, the rate of software supply chain security attacks has more than doubled in recent years, leading to renewed demand for software integrity defenses, especially for popular open source projects. In response to this demand, healthy competition has emerged between signing technologies like Sigstore and Notary v2 to set a new standard for secure delivery of open source container images. But how do these technologies fare when applied to private container image signing? While building integrity controls for their internal Kubernetes software supply chain, Datadog's security team has found that signing and verifying images internally is subtly different than in an open source setting. This talk will compare the unique challenges of signing container images internally versus in open source, and discuss how the leading open source signing frameworks meet those challenges at scale.

Speakers
avatar for Ethan Lowman

Ethan Lowman

Senior Software Engineer, Datadog
Ethan Lowman is a senior software engineer at Datadog working on software supply chain security, including container image signing and verification. Previously, he has worked on large-scale network flow monitoring systems, infrastructure configuration security monitoring tools, and... Read More →



Tuesday October 25, 2022 10:30am - 10:55am EDT
Room 430 A

11:00am EDT

No Keys? No Problem: Why You Can Trust Sigstore Signatures - Asra Ali, Google; Joshua Lock, VMware & Fredrik Skogman, GitHub
Are you skeptical of how a free, transparent, and community operated code signing service can be secure? If “keyless” signing sounds too good to be true, then this is the talk for you! In this talk, we will describe what Sigstore’s public infrastructure must protect in order to deliver this visionary future of keyless signing for software supply chain security. Then, we will discuss how it achieves this using a trust root that follows Sigstore core principles for openness. And finally, for good measure, we will put a Sigstore client to the test with a demo that mimics a real-life compromise of the critical components!

Speakers
avatar for Asra Ali

Asra Ali

Senior Software Engineer, Google
Asra is Software Engineer on the Google Open Source Security Team (GOSST) where she works on projects like Sigstore. She’s a maintainer of Sigstore’s Rekor, and The Update Framework’s go-tuf implementation. In previous times, she worked on Envoy, fuzzing, and privacy-preserving... Read More →
avatar for Joshua Lock

Joshua Lock

Distinguished Engineer, Verizon
Joshua is Open Source Architect in Verizon's Open Source Program Office, where he leads efforts to improve consistency around how Verizon uses open source. As part of his work at Verizon he works upstream on software supply chain security standards and tools; he is a steering committee... Read More →
avatar for Fredrik Skogman

Fredrik Skogman

Staff Engineer, Github
Fredrik is a Staff Engineer on the Package Security Engineering team at GitHub, where he focuses on securing the software supply chain. He previously spent several years as the technical lead for Pingdom and the SolarWinds cloud platform, where he focused on scalable and secure architectures... Read More →



Tuesday October 25, 2022 11:00am - 11:30am EDT
Room 430 A
  Sessions

11:35am EDT

Sigstore Or: How We Learned to Stop Trusting Registries and Love Signatures - Wojciech Kocjan & Tyson Kamp, InfluxData
Presentation talks about how InfluxData added signing of container images to its SaaS offering that uses around 100 different container images, is deployed on dozens of Kubernetes clusters in all major clouds. It shows the process from the perspective of DevOps and security teams.

It starts off by answering the important questions - “why are we doing it?” and “what would we get when this is done?”.

Session covers the roadmap InfluxData has taken to move from not signing any images, having partial checks in place to all critical workloads requiring signed images.

The SaaS offering consists of over 50 microservices, whose images are built multiple times a day via CD/CD.

It also uses open-source images by other teams inside the company as well as images provided by other companies.

The session provides details as to how each group differs and gets signed.

Presentation gives technical details on some aspects of the implementation - i.e. adding secure signing of container images in multiple CI/CD systems, key management.

It shows plans for reacting to security issues with images - from regular key rotation to getting all image signatures updated and invalidating older public keys.

Speakers
avatar for Wojciech Kocjan

Wojciech Kocjan

Senior Platform Engineer, InfluxData
Wojciech is an Engineer on the Deployments Team at InfluxData, focusing on automation of InfluxDB Cloud deployments across multiple public clouds and regions. He has a decade of experience working with multiple public clouds, and before that, worked in open source as a developer... Read More →
avatar for Tyson Kamp

Tyson Kamp

Security Architect
Tyson is an ISC2 Certified Software Security Lifecycle Professional (CSSLP), ISC2 Certified Cloud Security Professional (CSSP), and security architect and engineer. He has experience in application development in many environments and phases of development but has focused on security... Read More →



Tuesday October 25, 2022 11:35am - 12:00pm EDT
Room 430 A

1:00pm EDT

Verifiable Build Environments in the Cloud: Powered by Sigstore and Enclaves - Fabian Kammel, Edgeless Systems
Confidential computing is a breakthrough security technology. With it data can be kept encrypted during processing. Tools in the confidential computing space utilize these new concepts to provide fully-encrypted, high security environments, but as everyone in security knows: you are only as strong as your weakest link. Supply Chain Security is one of our industries weakest links. This talk will provide a deep drive of how Sigstore can help confidential (and other high security) products maintain a high level of security, keep their trusted compute base minimal, all the while preserving a high engineering velocity. To that end we will sketch out an architecture to build and sign in the cloud without malicious actors being able to steal signing keys or tamper with build processes. We will also show a live working demo of how such a system could be realized.

Speakers
avatar for Fabian Kammel

Fabian Kammel

Senior Security Engineer, Edgeless Systems
After graduating from Ruhr-University Bochum with a Master's in IT-Security, I worked for 5 years in automotive, transforming old & shaping new security products to drive the cloud transformation for both factory production lines, as well as on-road vehicle services. In my new position... Read More →



Tuesday October 25, 2022 1:00pm - 1:25pm EDT
Room 430 A

1:30pm EDT

Life of a Sigstore Signature - Jed Salazar & Zack Newman, Chainguard
Recently, Kubernetes SIG-release announced that the official Kubernetes container images have adopted Sigstore code signing to protect the supply chain of millions of downstream users. Sigstore, an open-source project aiming to be the LetsEncrypt of code signing, allows Kubernetes users to validate that their images came from the simple, free, and trusted official supply chain. But how does Sigstore actually work? What happens behind the scenes when I sign an image? Why should you even trust it? This talk follows the life of a Sigstore signature for your container image. On this journey, you’ll encounter keyless code signing, certificate authorities, and transparency logs. You’ll also configure an admission controller to create a signing security policy for your clusters.Our request hits every Sigstore component and you’ll stop to learn how they work, from the cryptographic and architectural levels, and discover how Sigstore mitigates supply chain attacks.

Speakers
avatar for Zachary Newman

Zachary Newman

Research Scientist, Chainguard, Inc.
Zack is passionate about developer tooling, supply chain security, and applied cryptography. After 4 years as a software engineer and tech lead on Google Cloud SDK, he moved to MIT CSAIL to research authenticated data structures and Tor network performance. Now, as a research scientist... Read More →
JS

Jed Salazar

Security Architect, Chainguard
Jed Salazar started his Security and SRE journey securing Alphabet companies at Google and working on Borg clusters. He's passionate about Cloud Native security from the supply chain to runtime and enabling everyone in the community. In his free time, he enjoys trail running in the... Read More →



Tuesday October 25, 2022 1:30pm - 1:55pm EDT
Room 430 A
  Sessions

2:00pm EDT

Securing Kubernetes Manifests with Sigstore and Kyverno - Jim Bugwadia, Nirmata & Yuji Watanabe, IBM Research
Kubernetes offers a powerful declarative configuration management system which allows users to specify the desired state using a set of resources. In this talk, Yuji and Jim will show how you can establish trust and protect the integrity of Kubernetes resources. They will use Sigstore to sign YAML definitions and Kyverno to verify resources during admission controls. They will highlight real-world use cases for resource signing such as tamper-prevention and approval workflows which can be driven using OSS tools like Cosign and Kyverno.

Speakers
avatar for Jim Bugwadia

Jim Bugwadia

Co-founder and CEO, Nirmata
Jim Bugwadia is a co-founder and the CEO of Nirmata, the Kubernetes policy and governance company. Jim is an active contributor in the cloud native community and currently serves as co-chair of the Kubernetes Policy and Multi-Tenancy Working Groups. Jim is also a co-creator and maintainer... Read More →
avatar for Yuji Watanabe

Yuji Watanabe

Senior Technical Staff Member, IBM Research
Yuji Watanabe is a Senior Technical Staff member at IBM Research that lives in Tokyo, Japan. He leads a research team on cloud native security and has been delivering new integrity monitoring and enforcement technology to the open-source community and products. His current focus is... Read More →



Tuesday October 25, 2022 2:00pm - 2:25pm EDT
Room 430 A
  Sessions

2:30pm EDT

The Road to SLSA4 – Applying the Sigstore Ecosystem in a Corporate Environment - Alex Ilgayev, Cycode
Sigstore’s ecosystem enables signing, verifying, and protecting software artifacts in a new way. By doing so, we can confirm that the software is what it claims to be. As part of the rising concerns of software supply chain attacks, we decided to adopt the Sigstore tooling, integrate it as part of our environment to increase the integrity level of our software artifacts, and share our insights of the process. In implementing Sigstore's ecosystem, we encountered several challenges that may be common to other organizations - our artifacts run on cloud-native, self-hosted, and even on-premise environments, and we use several build services, including a self-hosted K8s cluster. During the talk, we’ll explore the following concepts: - The trade-off for self-hosting rekor/fulcio instances against using public ones’. - Implementing “keyless” commit signatures with the gitsign utility instead of standard GPG. - Developing methodology and tools to verify commit signatures. - Using spiffe/spire to give our ephemeral build workloads identities. - Utilizing OIDC tokens for keyless signatures on artifacts in various build environments. - Developing methodology and tools to verify artifacts.

Speakers
avatar for Alex Ilgayev

Alex Ilgayev

Head of Security Research, Cycode
Alex Ilgayev is a security researcher specializing in software supply chain security vulnerabilities. At Cycode, he is responsible for hunting down security issues and researching possible mitigations. Before that, Alex led the malware research team at Check Point Research, where... Read More →



Tuesday October 25, 2022 2:30pm - 2:55pm EDT
Room 430 A

4:00pm EDT

Sigstore for Python Packaging: Next Steps for Adoption - William Woodruff, Trail of Bits
Sigstore is coming to the Python packaging ecosystem! For the past 9 months, engineers at Trail of Bits have worked with members and stakeholders within the Sigstore community to develop sigstore-python, a high-quality Python API and CLI for performing Sigstore-style signatures and verifications. Now comes the hard part: convincing members of Python's packaging ecosystem, among the largest and most critical, to adopt Sigstore into their package publishing and consumption workflows. This talk will perform a survey of Python packaging, and consider some of the ways in which Sigstore fits into the packaging user experience. Particular consideration will be given to two groups of packaging ecosystem users: "ordinary" users, who should benefit from baseline authenticity and integrity without having to substantially alter their workflows, and "proactive" users, who should be able to opt into *additional* security guarantees (such as verification against TUF-attested claims) both when packaging and consuming others' packages.

Speakers
avatar for William Woodruff

William Woodruff

Engineering Director, Trail of Bits
William Woodruff is an Engineering Director at Trail of Bits, a NYC-based cybersecurity consultancy. He currently splits his time between open source engineering (primarily supply chain and cryptographic engineering) and running the Ecosystem Security group, which is responsible for... Read More →



Tuesday October 25, 2022 4:00pm - 4:25pm EDT
Room 430 A
 
  • Timezone
  • Filter By Venue Detroit, MI USA
  • Filter By Type
  • Badge Pick-Up
  • Breaks
  • COVID-19 Test Kit Pick-Up
  • Experiences
  • Keynote Sessions
  • Lightning Talks
  • Opening/Closing Remarks
  • Sessions
  • Content Experience Level
  • Talk Type
  • Subject

Filter sessions
Apply filters to sessions.