No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Scheduled
Wait Listed
Personal Calendar
Speaking
Conference Event
Meeting
Interest
Scheduling function is not yet available. Try back on March 15th.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Reply
Replies ()
Search
New Post
Microblog
Microblog Thread
Post Reply
Post
Your session timed out.
This web page is not optimized for viewing on a mobile device. Visit this site in a desktop browser to access the full set of features.
DockerCon 2019
Add to My Interests
Remove from My Interests

279548 - Using Docker Content Trust (Notary) with Kubernetes Admission Controllers to further secure your runtime

Session Speakers
Session Description

The Update Framework (and its sister project from the CNCF, Notary...which is called Docker Content Trust) are a little known gems in the cloud native community. These projects are however extremely vital for making rigorous guarantees about the contents of your software package (in the land of Docker that's a container image,) when it is deployed into an environment like Kubernetes. We'll demystify TUF/Notary at the beginning of this talk, and then do a demonstration for setting up image signing through your build pipeline finally ending in Kubernetes where we will restrict the container images that can be deployed to just ones signed by us (using Validating/Mutating Admission Webhook Controllers.) My goal is to empower you to take the skills you learn from the talk and implement a similar process in your own CI/CD pipeline.


Additional Information
Open Source
Breakout
40 minutes
Session Schedule
    Similar Sessions
     
    Do Not Sell My Personal Information
    First name
    Last name
    Email address