Cloud Native Visibility and Security
Chris Kranz
Cloud Native Visibility and Security Chris Kranz Sysdig Secure - - PowerPoint PPT Presentation
Cloud Native Visibility and Security Chris Kranz Sysdig Secure DevOps for Cloud Native Open by design Ecosystem integration Strong momentum Founded by Wireshark Cloud-native security Customer expansion mirrors co-creator and
Chris Kranz
| Sysdig Inc. Proprietary Information 2
co-creator
sysdig (10M+ downloads)
cloud-native adoption
enterprises
and monitoring
control for secure operations
Open by design Strong momentum Ecosystem integration
| Sysdig Inc. Proprietary Information 3
and performance
and cost
response and forensics
Secure DevOps
Maximize application availability
Observability functions Security and compliance functions
Secure DevOps converges security and observability functions
| Sysdig Inc. Proprietary Information 4
We want report on all vulnerabilities and compliance violations in running containers in specific Kubernetes namespaces for audit purposes.
Japanese ISP
We need to improve our signals into SOC for detection, audit and hunting workflows for containers.
Large US Bank
We want to ensure images are free
practices before pushing to production.
Global Travel company
As containers come and go, we need to discover in real time which service- to-service connections are anomalies.
Major financial institution
Secure DevOps
| Sysdig Inc. Proprietary Information 5
Cloud native leaves you blind Security and operations fail without context Containers disappear and leave no trail
| Sysdig Inc. Proprietary Information 6
Legacy tools Point solutions
| Sysdig Inc. Proprietary Information 7
Embed Security Maximize availability Validate compliance
Converging visibility and security for production deployments
| Sysdig Inc. Proprietary Information 8
Sysdig Secure DevOps Platform
Respond Run Build
CI/CD Security Registry Security Apps Context Infrastructure
master node node
Alerts Event Forwarding/Audit/IR
SIEM Security Policies Configuration Vulnerabilities Metrics Events Audit logs Alerts Syscall captures Events
SaaS Self-hosted
| Sysdig Inc. Proprietary Information 9
Host Host
eBPF Program Container 1 Docker Container 2 Containerd Container 3 CRI-O Sysdig Agent Docker Host + Network Metrics Prom + Statsd Metrics Security Events Data Collection Security Enforcement
| Sysdig Inc. Proprietary Information 10
Why did it happen? What was the problem? Where did it occur?
Application context: Violation
Application context: Spike occurred in a container within java-app namespace
Incident: Privileged container is launched in Kubernetes that violates PCI article 10.2.5
Macro Micro
Incident: CPU spike noticed in several nodes in K8s infrastructure Dig down with low-level syscall data (commands, file activity, network connections correlated with Kubernetes activity)
Example: Investigate compliance violation Example: Troubleshoot performance issue
| Sysdig Inc. Proprietary Information 11
misconfigurations with a single workflow
impacting performance
after the container is gone
during build
compliance (NIST, PCI)
all cloud-native activity
performance and capacity
with a single source of truth
across clusters and clouds
Embed security Validate compliance Maximize availability
| Sysdig Inc. Proprietary Information 12
DevOps
Continuous Compliance (PCI, NIST, CIS, etc.)
Respond Run Build Unified platform for security and DevOps use cases
Secure DevOps
| Sysdig Inc. Proprietary Information 13
Top 5
Software Company
1,000+ K8s context; open-core; unique forensics and auditing capabilities, scale
Japanese ISP
10K+ K8s context; runtime detection; single platform; scale
Respond Run Build
Top 5
Public Cloud
1,000+ K8s-native; Prometheus integration, scale Top 5
Investment Bank
100K+ Automated context; data depth, MITRE runtime rules, scale Top 10
US Bank
5,000+ Automated context; data depth; MITRE runtime rules, audit, open-core; scale Nodes
| Sysdig Inc. Proprietary Information 14
Image scanning
Vulnerability feeds
Monitoring
Infrastructure and application metrics
Runtime security
Detection policies and alerts
Forensics/Troubleshooting
Deep visibility into container activity
Sysdig Secure DevOps Platform
Adds scale, workflow, K8s, and cloud context Respond Run Build
| Sysdig Inc. Proprietary Information 16
across clusters and clouds
historical application behavior
Native integrations
dynamic service topology
correlating metrics and events
with a single source of truth
performance and capacity
dashboards, alerts by roles
Kubernetes events knowledge to avoid downtime
Scale for production Speed up troubleshooting Maximize availability
| Sysdig Inc. Proprietary Information 22
vulnerabilities and miscon- figurations in containers
vulnerabilities and identifying owner
compliance pre-deployment
triggering response actions and downstream notifications
container is gone
all cloud-native activity
impacting performance using K8s native controls
automated policies
creating and maintaining runtime policies
Deploy securely Validate compliance Block threats at runtime
| Sysdig Inc. Proprietary Information 23
generating Kubernetes policies
Kubernetes Pod Security Policies
using K8s controls without impacting performance
including commands and network connections to speed incident response
figuration issues by mapping activity to users or services
NIST audit
deployment to avoid breaking applications
by tuning Falco runtime policies
Prevent Respond Optimize
| Sysdig Inc. Proprietary Information 24
Auto-generate policy from pod configuration:
time
Pod Security Policies Leverage K8s controls to handle enforcement:
PSP enforcement
relying on security agents Validate policy prior to deployment:
positives
Generate Prevent Validate
| Sysdig Inc. Proprietary Information 25
searchable and indexable against Kubectl activity
K8s stack
HIPAA, etc. audit
| Sysdig Inc. Proprietary Information 26
Enriched activity Example queries
Activity
Context
namespace to an unknown IP address
all the command and network activity that happened inside the pod
has happened in a host or K8s deployment
| Sysdig Inc. Proprietary Information 29
Embed security Validate compliance Maximize availability Converge visibility and security to run cloud native in production
| Sysdig Inc. Proprietary Information 30