Top Trends in Kubernetes Security: TalosCon 2025

CherylHung4 24 views 32 slides Oct 17, 2025
Slide 1
Slide 1 of 32
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32

About This Presentation

In this talk I discuss some of the fundamental challenges of security in a Kubernetes, cloud native environment, and how Shift-Down Security can help.

Reading: https://github.com/kubernetes/sig-security/blob/main/sig-security-docs/papers/shift-down/shift-down-security.md#shift-down-security


Slide Content

SideroLabs 2025 | All rights reserved. Top Trends in K 8 s Security Space Cheryl Hung, 17 Oct 2025, Amsterdam

‹#› oicheryl.com Independent P reviously Sr Director, Ecosystem at Arm Cheryl Hung

‹#›

‹#› What are your challenges when using/deploying containers?

‹#› What % said security ? What are your challenges when using/deploying containers?

‹#› % say security is a challenge when using containers

‹#› % say security is a challenge when using containers

‹#› % say security is a challenge when using containers

‹#› % say security is a challenge when using containers

‹#› % say security is a challenge when using containers

‹#› % say security is a challenge when using containers

‹#› Why is security so tricky?!

‹#› Shared responsibility leads to gaps

‹#› Shared responsibility leads to gaps Misconfiguration is the killer

‹#› Shared responsibility leads to gaps Misconfiguration is the killer Identity is the new perimeter

‹#› Shared responsibility leads to gaps Misconfiguration is the killer Identity is the new perimeter Speed vs security tensions

‹#› So what now?

‹#› “Shift Down” Kubernetes Security Paper Published Feb 2025

‹#› ✨ Application team Develop features Fix defects

‹#› ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects ✨ Application team s Develop features Fix defects

‹#› ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects 🔒 Security team Runtime security Compliance Vulnerabilities Misconfigurations SW supply chain

‹#› ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects 🤖 Platform team Self-service / Automation 🔒 Security team Runtime security Compliance Vulnerabilities Misconfigurations SW supply chain

‹#› ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects 🤖 Platform team Self-service / Automation Vulnerabilities Misconfigurations Supply chain 🔒 Security team Runtime security Compliance Vulnerabilities Misconfigurations SW supply chain

‹#› ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects 🔒 Security team Runtime security Compliance Vulnerabilities Misconfigurations SW supply chain 🤖 Platform team Self-service / Automation Vulnerabilities: Manage base images Misconfigurations Supply chain

‹#› ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects 🔒 Security team Runtime security Compliance Vulnerabilities Misconfigurations SW supply chain 🤖 Platform team Self-service / Automation Vulnerabilities: Manage base images Misconfigurations: Manage policies Supply chain

✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects ‹#› ✨ Application teams Develop features Fix defects 🔒 Security team Runtime security Compliance Vulnerabilities Misconfigurations SW supply chain 🤖 Platform team Self-service / Automation Vulnerabilities: Manage base images Misconfigurations: Manage policies Supply chain: Secure, attest, verify

✨ Application teams Develop features Fix defects ✨ Application teams Develop features Fix defects ‹#› ✨ Application teams Develop features Fix defects 🤖 Platform team Self-service / Automation Vulnerabilities: Manage base images Misconfigurations: Manage policies Supply chain: Secure, attest, verify 🔒 Security team Runtime security Compliance Vulnerabilities Misconfigurations SW supply chain

‹#› Embrace the chaos - platform team manages common concerns

‹#› Embrace the chaos - platform team manages common concerns Automate trust - Policy as Code

‹#› Embrace the chaos - platform team manages common concerns Automate trust - Policy as Code Less is more - complements Shift Left, but reduces developer overhead

‹#› github.com/kubernetes/sig-security/blob/main/sig-security-docs/papers/shift-down/shift-down-security.md

Thank you ‹#› oicheryl.com
Tags