Global AppSec Tel Aviv Program Schedule (NOT Registration site)
Sunday, May 26 • 9:00am - Tuesday, May 28 • 6:00pm
Attacking and Defending Containerized Apps and Serverless Tech

Sign up or log in to save this to your schedule and see who's attending!

With Organizations rapidly moving towards micro-service style architecture for their applications, container and serverless technology seem to be taking over at a rapid rate. Leading container technologies like Docker have risen in popularity and have been widely used because they have helped package and deploy consistent-state applications. Serverless and Orchestration technologies like Kubernetes help scale such deployments to a massive scale which can potentially increase the overall attack-surface to a massive extent if security is not given the attention required. Security continues to remain a key challenge that both Organizations and Security practitioners face with containerized and, serverless deployments. While container orchestrated deployments may be vulnerable to security threats that plague any typical application deployments, they face specific security threats related to the containerization daemon, shared kernel, shared resources, secret management, insecure configurations, role management issues and many more! Serverless deployments, on the other hand, face risks such as insecure serverless deployment configurations, Inadequate function monitoring, and logging, Broken authentication, Function event data injection & Insecure application secrets storage. Attacking an infrastructure or Applications leveraging containers and serverless technology requires specific skill-set and a deep understanding of the underlying architecture.

This training has been created with the objective of understanding both offensive and defensive security for container orchestrated and serverless deployments. It will be a 3-day program that will detail through specific theory elements with extensive hands-on exercises that are similar to real-world threat scenarios that the attendees will understand and take part in and, will also understand ways in which containerized and serverless deployments can be attacked, made secure, yet scalable, efficient and effective.

The training consists of, but not limited to the following focus areas in Container Security and Serverless Deployment:
* Introduction to Container Technology
* Containerized Deployments and Container Orchestration Technologies
* Container Threat-Model
* Attacking Containers and Security deep-dive
* Introduction to Kubernetes
* Threat-Model of Orchestration technologies
* Attacking Kubernetes
* Kubernetes Defense-in-Depth
* Logging & Monitoring Orchestrated deployments
* Introduction to Serverless
* Deploying Application to AWS Lambda
* Serverless Threat-Model
* Attacking a Serverless Stack
* Serverless Security Deep-dive

Trainers will provide:
Slides for the training course.
* Virtual Machine(s) with all the required software and reference material.
* Access to Cloud Lab-environment for Hands-on exercises
* GitHub Links to access libraries for most examples covered here
* Detailed documentation of all the Demos and exercises covered

Minimum Laptop Requirements:
* We have created cloud labs for all the exercises and labs of the program to work. You will need a terminal program to SSH into the remote lab environments. These programs should work fine: Mac OSX => ITerm2 or Terminal (no need to install), Windows => Putty or Cygwin, Linux => Terminal (no need to install anything else)
* Intel i5 and above preferred, 64bit Operating System (32 bit will NOT work), 8GB+ RAM preferred. Netbooks WON’T work
* Minimum 80GB HDD space available
* Working WiFi adapter with an ability to connect to third-party wireless networks
* User must be able to use the USB port of the laptop to copy, install and run the Virtual Machine, which will be delivered in a USB Mass Storage Device(Flash Drive).
* Soft copy of the Slides and the VMs will be given to participants on a USB Flash Drive that will be formatted with the NTFS format.
* Please download and install the latest installation of Oracle VM VirtualBox
* We have observed that Windows laptops often come with Virtualization options disabled in the BIOS. In such cases, the Virtual Machine and the workshop exercises won’t work. Please ensure that the following measures are taken to make your laptop available for Virtualization
* You must have access to your BIOS menu. This can be accessed by pressing F12 (not all laptops, some may have a different key to access the BIOS menu). In some cases, there may be a password to access the BIOS menu. Please ensure that you have a password (if required) to access the BIOS menu.
* Guide to enable virtualization: https://www.google.com/amp/s/www.howtogeek.com/213795/how-to-enable-intel-vt-x-in-your-computers-bios-or-uefi-firmware/amp/
* A valid AWS account with paid/free-tier access to Lambda with permission to deploy and run lambda applications will be necessary.

Attendees should know:
* Students should have a basic understanding of Linux environment and know their way around the terminal.
* A basic understanding of ‘OWASP TOP-10 Vulnerabilities’ and ‘Basics of Docker’ will be helpful

avatar for Nithin Jois

Nithin Jois

Solutions Engineer who specializes in DevSecOps, We45
Nithin Jois is a Solutions engineer at we45 - a focused Application Security company. He has helped build ‘Orchestron’ - A leading Application Vulnerability Correlation and Orchestration Framework. He is experienced in Orchestrating containerized deployments securely to Production... Read More →

Sunday May 26, 2019 9:00am - Tuesday May 28, 2019 6:00pm
TBA InterContinental David Kaufmann St 12, Tel Aviv-Yafo, 61501, Israel
Feedback form isn't open yet.

Attendees (1)