Kubernetes-Native Approaches to Log4Shell

Thursday, 17 February 2022 | 11:30am to 12:30pm AEDT

OVERVIEW

Log4Shell is a recent software vulnerability found in the Apache Log4j v2 library, a popular Java library used in many enterprise applications. This critical vulnerability potentially allows an attacker to execute remote code and gain a foothold within an organisation.

Kubernetes is now the standard for digital innovation, and securing Kubernetes infrastructure and deployed container applications is increasingly important for Australian and New Zealand organisations creating digital services.

In this session Red Hat's Satian Vasudevan and Shane Boulden will look at Kubernetes-native approaches to Log4Shell detection and remediation. We'll discuss and provide demonstrations detecting vulnerable container images during development; preventing vulnerable container images being deployed to running Kubernetes platforms; and creating policies to detect and respond to runtime Log4Shell exploitation using the Kubernetes APIs.

We'll also explore the outcomes of the recent White House Open Source Security Summit, held in the wake of the Log4Shell vulnerability discovery and attended by Red Hat and a select group of technology industry leaders. Specifically, we’ll look at how organisations can maintain greater visibility into their software and collaboratively build trust and resiliency.

Who should attend:

  • Cloud architects interested in securing Kubernetes infrastructure
  • DevSecOps architects and practitioners looking to inject security processes into application development
  • Anyone interested in Kubernetes and container security, and reducing exposure to critical vulnerabilities
If you have any questions, please reach out to Rebecca Innes rinnes@redhat.com
© 2024 Red Hat, Inc.