Cloud Native Hyderabad

April Virtual Meetup - Security Lessons For Cloud Native Engineers

Capacity:
virtual
Event date
Apr 16, 26
08:00 PM - 09:00 PM IST
Location
Virtual event
About this event

As organizations rapidly adopt cloud-native architectures to accelerate delivery, traditional security paradigms are no longer sufficient. Old ways have been replaced by ephemeral workloads, dynamic microservices, and code-driven infrastructure. While these technologies offer unparalleled agility, they also introduce a novel and complex attack surface. This talk breaks down the critical pillars of cloud-native security, offering engineers and security professionals practical insights into securing their modern environments without sacrificing deployment speed.

1. Containers: Developer's Best Friend or a Security Nightmare?

Containers have revolutionized how we build and ship software, offering unmatched portability and speed. However, they also share the host OS kernel and can become a massive liability if misconfigured. We will explore the dual nature of containers, discussing how to embrace an immutable infrastructure mindset. Topics include the dangers of running containers as root, the importance of minimizing base image footprints (like distroless images), and why continuous runtime scanning is essential for preventing container breakouts.

2. The Software Supply Chain: A Must Know

In a cloud-native world, you aren't just deploying the code you write; you are deploying thousands of lines of third-party dependencies. Recent high-profile breaches have proven that attackers are shifting their focus to the software supply chain. This section will demystify how to secure your pipelines. We will cover the critical role of Software Bills of Materials (SBOMs), how to automatically scan for CVEs in third-party libraries, and the necessity of cryptographically signing container images to ensure integrity from commit to cluster.

3. Observability: Security In Disguise

You cannot secure what you cannot see. Traditionally viewed as a tool for platform engineers to debug performance bottlenecks, observability is secretly one of your most powerful security assets. We will discuss how rich telemetry—logs, metrics, and distributed traces—can be leveraged to detect anomalous behavior, map the blast radius of a potential breach, and drastically reduce Incident Response times in environments where workloads might exist for only a few seconds.

4. Identity: The New Security Perimeter

The days of trusting everything inside a private corporate network are over. In a distributed cloud environment, the IP address is ephemeral, making Identity and Access Management (IAM) your true perimeter. This chapter breaks down the practical application of Zero Trust architecture. We will explore how to enforce the principle of least privilege not just for human operators, but for machine identities, service accounts, and microservices communicating with one another.

5. IaC Misconfigurations: Your Biggest Threat

Infrastructure as Code (IaC) tools like Terraform and CloudFormation allow us to spin up complex environments in minutes. Unfortunately, this means a single typo can deploy a massive vulnerability—like a publicly accessible database—at scale. We will wrap up the talk by examining why misconfigurations remain the leading cause of cloud breaches. Learn how to implement "Security as Code" by automatically scanning IaC templates in your CI/CD pipelines to catch fatal errors long before they ever reach production.

Speakers
Organizers