Edge-First Security at Scale: Lessons from orchestrating security across 35,000+ POS Devices
References
Session Categories
Which track are you applying for?
Speakers
Barun Acharya
eBPF Engineer | OdigosBarun likes hacking on low level stuff and fiddling around developer toolings. He currently is maintainer and leading the development efforts for KubeArmor, CNCF Sandbox project and works as a Software Engineer at Odigos. He loves to speak at conferences talking about Open Source, Cloud Native and Security. He is a proud CNCF Ambassador. He has been associated and am actively mentoring with programs like Google Summer of Code and LFX Mentorship.
Swarit Pandey
Founding Software Engineer | Step SecuritySoftware Engineer at StepSecurity, leading development of a static analysis platform to detect and prevent supply chain attacks. Previously served as Software Engineer at AccuKnox, where I handled the core distributed messaging infrastructure and event-driven systems backed by RabbitMQ and Apache Pulsar.At AccuKnox, I was part of the core team behind a major security partnership with IDT Telecom and led the CI/CD runtime security product powered by KubeArmor (eBPF+LSM). I designed event-driven systems for VM and multi-cloud workload protection, and owned the hardening policy generation module within AccuKnox's Discovery Engine.Experienced in distributed systems, cybersecurity, and infrastructure engineering with a focus on runtime security and supply chain protection.
Reviews
This seems like a highly technical talk, but it may be a little too specific and boring. This might need to include a demo of what the speaker is talking about in order for people to really grasp what's going on.
With a few changes to spice it up, I think it could be a very good talk.
Interesting to know how real-world challenges are solved around security especially remote and I agree with the other review, strong narration will be key. We can probably share pointers to the speaker on a dry run.
"How do you enforce real-time security on 30,000 unorchestrated POS devices that go offline for days?"... you can't! Any new security threats that emerge when the device is offline can't be addressed. The POS device could be connected to WiFi and not connected to the their cloud... providing a sufficient window for exploitation.
This talk seems is about leveraging KubeArmor in a local context - but who is this aimed at ? Is it aimed at cloud developers looking to build on device software, or to persuade device level software devs to use cloud derived tools ?
It's not clear why the proposers started with KubeArmor when something more suitable to that purpose such as microk8s is an option too.
Despite some lack of clarity this could well be a useful talk, provided the proposers set adequate context and make this talk an exploration of a set of choices they took, what drawbacks they found and how they addressed them.