PlatformCON 2022
Our talk by Aviram Shmueli: The migration from monoliths to microservices is long behind us, however managing microservices operations at scale comes with a layer of complexity, particularly with aspects of security that still have a learning curve. But what if all of this could be simplified and automated pretty easily?
If we think about our production cloud native & microservices operations, in the same way we think about how we design and build our products, we could build and automate minimum viable security plans that we could easily bake into our config files and CI/CD processes. Once we build this foundational framework of security, it will always be possible to iterate and evolve our security framework, for advanced layers of security that often comes with time, increased experience, and greater maturity around security.
In this talk, we will present what MVS looks like for cloud native operations, how to build a cluster secured by design, continuously monitoring networking, container internals and primitives, and access management with a least privilege principle mindset. In this session we will demonstrate this through code, and even how this can work seamlessly with other CNCF ecosystem projects - from Helm to OPA, ArgoCD, Notary, as well at the most common DevOps stacks - Terraform, to AWS, Github Actions and more.
Agenda
Traditional AppSec toolchains often feel like a patchwork of tools—each with its own setup, maintenance, and integration challenges. They can slow down development, overwhelm teams with alerts, and still leave gaps in security coverage. In this talk, we’ll explore how to set up a comprehensive DevSecOps chain using GitHub Actions integrated with best-in-class open-source tools for SAST, secrets detection, SCA, and DAST. Then, we’ll show how you can rethink this workflow using an AI agent powered by AWS Bedrock and Claude to review code, streamline processes, and deliver actionable insights. Through a live demo, you’ll see both approaches in action and learn how to overcome common pitfalls in building secure pipelines. By the end, you’ll gain practical knowledge to enhance your security practices, reduce friction in your workflows, and adopt modern tools with confidence. Whether you're a developer, security professional, or DevOps enthusiast, this talk will help you take your DevSecOps to the next level.
Traditional AppSec toolchains often feel like a patchwork of tools—each with its own setup, maintenance, and integration challenges. They can slow down development, overwhelm teams with alerts, and still leave gaps in security coverage. In this talk, we’ll explore how to set up a comprehensive DevSecOps chain using GitHub Actions integrated with best-in-class open-source tools for SAST, secrets detection, SCA, and DAST. Then, we’ll show how you can rethink this workflow using an AI agent powered by AWS Bedrock and Claude to review code, streamline processes, and deliver actionable insights. Through a live demo, you’ll see both approaches in action and learn how to overcome common pitfalls in building secure pipelines. By the end, you’ll gain practical knowledge to enhance your security practices, reduce friction in your workflows, and adopt modern tools with confidence. Whether you're a developer, security professional, or DevOps enthusiast, this talk will help you take your DevSecOps to the next level.
You cannot detach engineering processes and culture from the infrastructure.In this talk we will share from our experience of supporting and managing serverless production environments. We will discuss the not-so-obvious way it differs from managing other more common modern infrastructures and the impact it has on the operations methodology. we will discuss how it influences the developers day to day work and lessons learned.
Let's face it - now that we're a few years past the whole "shift left" trend, we can honestly say it has largely failed when considering security debt. Instead of solving issues earlier in the cycle, which was at the premise of the “shift left” promise, we mostly shifted the problem left. To date, security has largely been a source of friction between development and security teams––and fostering a proactive security culture among developers is still the holy grail a lot of companies are dreaming about without really managing to reach it. That's because this mindset needs a hard reset. We need to look at security completely differently. Security should not and cannot be decoupled from product quality - notably because developers are measured on code quality and velocity and not on how secure their code is. In the same way that our product's usability is a first-order engineering concern, security should be regarded in the exact same way. In this talk, I'll share some lessons learned and the way to bridge the gap between security and engineering, by changing the way it is viewed and implemented in current processes.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna