Skip to content

Commit 10c33c3

Browse files
committed
Final slides for 20230517
1 parent 3f56db8 commit 10c33c3

10 files changed

+24
-37
lines changed

060_security/11_artifacts/slides.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Distribution spec 1.1.0-rc.2 [](https://github.com/opencontainers/distribution-s
1515

1616
Referrers add relationships between digests
1717

18-
Implementations: [regclient](https://github.com/regclient/regclient/blob/main/docs/regctl.md#artifact-commands), [trivy](https://github.com/aquasecurity/trivy-plugin-referrer), [oras](https://oras.land/docs/cli/reference_types/#discovering-artifact-references), [distribution](https://github.com/oras-project/distribution)
18+
Implementations: [regclient](https://github.com/regclient/regclient/blob/main/docs/regctl.md#artifact-commands), [trivy](https://github.com/aquasecurity/trivy-plugin-referrer), [oras](https://oras.land/docs/cli/reference_types/#discovering-artifact-references), [distribution](https://github.com/oras-project/distribution), cosign [](https://github.com/sigstore/cosign/blob/v2.0.2/doc/cosign_sign.md?plain=1#L94)
1919

2020
---
2121

120_kubernetes/kyverno/cosign.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Kyverno for Cosign
22

3-
Kyverno can verfiy image signatures
3+
Kyverno can verify image signatures
44

55
Select images using wildcards
66

170_supply_chain_security/activity.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ scorecard --repo=github.com/moby/moby
2424

2525
## Scorecard data
2626

27-
One million critical open source projects are scanned weekls [](https://github.com/ossf/scorecard#public-data)
27+
One million critical open source projects are scanned weekly [](https://github.com/ossf/scorecard#public-data)
2828

2929
Data is shared publicly
3030

170_supply_chain_security/approaches.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Automated dependency updates
1010

1111
Generate a Software Bill of Materials (SBoM)
1212

13-
Scan for vulnerabilities
13+
Scan for vulnerabilities and audit
1414

1515
Scan for license compliance
1616

170_supply_chain_security/cosign/cosign.demo

+12-1
Original file line numberDiff line numberDiff line change
@@ -28,4 +28,15 @@ https://search.sigstore.dev/
2828
# Verify signature
2929
EMAIL=???
3030
COSIGN_EXPERIMENTAL=1 cosign verify ghcr.io/nicholasdille/container-slides/ubuntu:22.04 --certificate-oidc-issuer https://github.com/login/oauth --cer
31-
tificate-identity ${EMAIL}
31+
tificate-identity ${EMAIL}
32+
33+
# Sign arbitrary artifact
34+
curl -sLO https://github.com/aquasecurity/trivy/releases/download/v0.41.0/trivy_0.41.0_Linux-64bit.tar.gz
35+
curl -sLO https://github.com/aquasecurity/trivy/releases/download/v0.41.0/trivy_0.41.0_Linux-64bit.tar.gz.pem
36+
curl -sLO https://github.com/aquasecurity/trivy/releases/download/v0.41.0/trivy_0.41.0_Linux-64bit.tar.gz.sig
37+
COSIGN_EXPERIMENTAL=1 cosign verify-blob trivy_0.41.0_Linux-64bit.tar.gz \
38+
--certificate trivy_0.41.0_Linux-64bit.tar.gz.pem \
39+
--signature trivy_0.41.0_Linux-64bit.tar.gz.sig \
40+
--certificate-oidc-issuer https://token.actions.githubusercontent.com \
41+
--certificate-identity-regexp 'https://github.com/aquasecurity/trivy/.github/workflows/reusable-release.yaml@refs/tags/v*' \
42+
--certificate-github-workflow-repository aquasecurity/trivy
+5-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
11
## Docker Scout
22

3-
XXX
3+
XXX https://docs.docker.com/scout/
4+
5+
XXX https://docs.docker.com/engine/reference/commandline/scout_cves/
6+
7+
XXX recommendations

170_supply_chain_security/sbom/sbom.demo

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ docker-setup --tools=docker,buildx,docker-compose,kind,helm,kubectl,gvisor,cosig
77
syft packages aquasec/trivy:0.34.0 --file trivy.json --output cyclonedx-json
88

99
# Generate SBoM of alpine 3.16
10-
syft packages alpine:3.16 --file alpine-3.16.json --output cyclonedx-json
10+
syft packages alpine:3.18 --file alpine-3.18.json --output cyclonedx-json
1111

1212
# Scan trivy.json
1313
grype sbom:trivy.json

170_supply_chain_security/vulnerabilities.md

-3
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,6 @@ Linked to vendors/products/versions by<br/>*Common Platform Enumeration* (CPE) [
88

99
Scored by<br/>*Common Vulnerability Scoring System* (CVSS) [](https://nvd.nist.gov/vuln-metrics/cvss)
1010

11-
- Scale 0-10
12-
- Low, medium, high, critical
13-
1411
Also scored by<br/>*Exploit Prediction Scoring System* (EPSS) [](https://www.first.org/epss/)
1512

1613
### Understand your dependencies [](https://deps.dev/)

2023-05-17_heise-Webinar-KubernetesSupplyChainSecurity.html

+2-2
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@
7979

8080
<section data-markdown="" data-separator="^---$" data-separator-vertical="^--$"><textarea data-template="">
8181
<!-- .slide: class="center" -->
82-
## <i class="fa-duotone fa-ball-pile"></i> Dependencies / Vulnerabilites
82+
## <i class="fa-duotone fa-bug"></i> Dependencies / Vulnerabilites
8383
</textarea></section>
8484
<section data-markdown="170_supply_chain_security/vulnerabilities.md" data-separator="^---$" data-separator-vertical="^--$"></section>
8585
<section data-markdown="170_supply_chain_security/sbom/slides.md" data-separator="^---$" data-separator-vertical="^--$"></section>
@@ -101,7 +101,7 @@
101101

102102
<section data-markdown="" data-separator="^---$" data-separator-vertical="^--$"><textarea data-template="">
103103
<!-- .slide: class="center" -->
104-
## <i class="fa-duotone fa-ball-pile"></i> Activity
104+
## <i class="fa-duotone fa-person-hiking"></i> Activity
105105
</textarea></section>
106106
<section data-markdown="170_supply_chain_security/activity.md" data-separator="^---$" data-separator-vertical="^--$"></section>
107107

2023-05-17_heise-Webinar-KubernetesSupplyChainSecurity.md

-25
This file was deleted.

0 commit comments

Comments
 (0)