How to make Containers actually Contain? Docker, SELinux and Coloring Books. Note: WE ARE MEETING AT CIVIC HALL!! We'll need names, and you will need IDs. RSVP will open Thurs Sept 24th, 2015, 4:30pm.
As container use gains popularity, container security is more important than ever. This talk is split into 4 parts detailing security measures in containers, signing, authentication and authorization with the daemon, and mandatory access control. In this session, you will: - Learn about the security measures in container management that control what processes within a container can do, and hear about upcoming security enhancements to containers. - See how container images are signed. - Discover authentication updates being made to the server to control who’s able to manipulate a container, and learn how developers are splitting functions that an authenticated user is allowed to do on the server. - Learn how SELinux works and how it works with Docker.
Afterwards: Join us afterwards at The Storehouse Pub where we'll continue the discussion over drinks and/or food. The Storehouse Pub is located at 69 W. 23rd Street.
Daniel Walsh has worked in the computer security field for over 30 years. Dan joined Red Hat in August 2001. Dan leads the RHEL Docker enablement team since August 2013, but has been working on container technology for several years. He has led the SELinux project, concentrating on the application space and policy development. Dan helped developed sVirt, Secure Vitrualization. He also created the SELinux Sandbox, the Xguest user and the Secure Kiosk. Previously, Dan worked Netect/Bindview's on Vulnerability Assessment Products and at Digital Equipment Corporation working on the Athena Project, AltaVista Firewall/Tunnel (VPN) Products. Dan has a BA in Mathematics from the College of the Holy Cross and a MS in Computer Science from Worcester Polytechnic Institute. Twitter: rhatdan Blog: danwalsh.livejournal.com Email: [masked]
Claim the event and start manage its content.I am the organizer