Webinar: Boost Container Image Security & Compliance with Encryption π
Discover how container image encryption enhances security and compliance. Learn practical strategies to protect your images beyond signing in this insightful webinar!

CNCF [Cloud Native Computing Foundation]
1.2K views β’ Jul 15, 2020

About this video
When it comes to container image security, you may have heard about image signing, which helps ensure the integrity and provenance of a container image. However, security gaps remain for protecting the confidentiality of the images and ensuring untrusted hosts cannot run them. For example, if a registry is compromised, we donβt want our top secret algorithms to be stolen!
In this webinar, we will introduce Container Image Encryption, a recently introduced capability to provide developers a way to protect sensitive contents of their container images. This is a cross project effort spanning multiple projects including containerd, crio, skopeo, buildah, and OCI. We will perform a deep dive into the image encryption technology, and show a demo on the end-to-end developer flow, from building and encrypting the image, pushing it to a registry, and decrypting and running it on a kubernetes cluster.
Finally, we will show an example of how the technology can help meet compliance requirements through geofencing execution of container workloads. i.e. being able to say βa container workload should only be runnable by clusters in the EU region."
Presenter:
Brandon Lum, Senior Software EngineerΒ @IBM
In this webinar, we will introduce Container Image Encryption, a recently introduced capability to provide developers a way to protect sensitive contents of their container images. This is a cross project effort spanning multiple projects including containerd, crio, skopeo, buildah, and OCI. We will perform a deep dive into the image encryption technology, and show a demo on the end-to-end developer flow, from building and encrypting the image, pushing it to a registry, and decrypting and running it on a kubernetes cluster.
Finally, we will show an example of how the technology can help meet compliance requirements through geofencing execution of container workloads. i.e. being able to say βa container workload should only be runnable by clusters in the EU region."
Presenter:
Brandon Lum, Senior Software EngineerΒ @IBM
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.2K
Likes
25
Duration
44:58
Published
Jul 15, 2020
User Reviews
4.5
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.