Continuous vulnerability scanning in production - Oshrat Nir from ARMO
Cloud CommuteMay 24, 2024x
13
00:24:3222.47 MB

Continuous vulnerability scanning in production - Oshrat Nir from ARMO

Running vulnerability scanners during development and in your build pipeline is great, but not enough. Newly emerging CVEs, and other application behavior anomalies need to be caught in production. Oshrat Nir, from ARMO, talks about the importance of runtime vulnerability scanning.

If you have questions to Oshrat, you can reach her here:

If you want to give ARMO or Kubescape:

Additional show notes:

The Cloud Commute Podcast is presented by simplyblock (https://www.simplyblock.io)


01:00:00
Again, we're very cognizant of

01:00:01
alert fatigue because what happens

01:00:04
is people are overwhelmed.

01:00:06
So they'll either work themselves

01:00:07
to burnout or

01:00:08
start ignoring things.

01:00:10
Neither is a good option.

01:00:16
You're listening to simplyblock's Cloud Commute Podcast,

01:00:19
your weekly 20 minute

01:00:20
podcast about cloud technologies,

01:00:22
Kubernetes, security,

01:00:23
sustainability, and more.

01:00:26
Welcome back to the next episode

01:00:27
of simpleblock's

01:00:28
Cloud Commute podcast.

01:00:29
This week, I have another person

01:00:32
or another guest

01:00:33
from the security space,

01:00:35
something that really

01:00:36
is close to my heart.

01:00:38
So thank you for

01:00:40
being here, Oshrat.

01:00:41
Is that actually correct?

01:00:43
I forgot to ask up front.

01:00:45
It's hard to say my name correctly

01:00:47
if you're not a

01:00:48
native Hebrew speaker,

01:00:50
but Oshrat is close enough.

01:00:52
Okay.

01:00:52
It's close enough.

01:00:53
All right.

01:00:53
I forgot to ask that.

01:00:56
So maybe you do a

01:00:58
quick introduction.

01:00:59
Who are you?

01:01:00
Where are you from?

01:01:02
What do you do?

01:01:03
And we'll take it from there.

01:01:07
So thanks Chris for having me.

01:01:09
This is a great opportunity.

01:01:11
My name is Oshrat Nir.

01:01:12
I am currently the developer

01:01:14
advocate for ARMO and

01:01:17
Kubescape, which is our

01:01:19
CNCF sandbox project.

01:01:21
So we have been enterprise and an

01:01:24
open source product

01:01:27
or platform that I look

01:01:29
after. I've been at ARMO for a

01:01:32
year and a half.

01:01:33
I've been in cloud native for

01:01:36
about five and a half.

01:01:38
And before that, I

01:01:40
worked in telco, I guess.

01:01:44
And fun fact about me is that I

01:01:46
lived on three

01:01:47
continents before I was nine years old.

01:01:50
All right.

01:01:51
All right.

01:01:51
We'll come back to that.

01:01:53
Or maybe just now.

01:01:55
What do you mean you lived on

01:01:56
three continents?

01:01:58
I was born in

01:01:59
Germany which is Europe.

01:02:02
And then I left Germany when I was

01:02:03
two years old,

01:02:05
nearly three, and moved to

01:02:07
the States and I lived in

01:02:09
Philadelphia for six years.

01:02:11
And when I was eight and a half

01:02:14
years old, I moved to

01:02:16
Israel and that's where

01:02:18
I've been living since.

01:02:19
All right.

01:02:19
All right.

01:02:20
Okay, two years.

01:02:21
So you're not...

01:02:23
I don't speak German.

01:02:25
All right.

01:02:28
Fair enough.

01:02:29
Fair enough.

01:02:29
I tried to learn from German when

01:02:31
I was working for

01:02:32
a German company.

01:02:34
My friend at Giant,

01:02:35
shout out to Giant Swarm.

01:02:39
But no, they did a lot of good

01:02:41
things for me, which was

01:02:42
introduced me to cloud

01:02:43
native, but German

01:02:44
was not one of them.

01:02:45
I agree.

01:02:47
And I feel sad for everyone.

01:02:48
We're sorry for everyone who has

01:02:49
to learn German.

01:02:50
The grammar is such a pain.

01:02:54
Anyway, you said

01:02:55
you work for ARMO.

01:02:56
So tell us a little bit about ARMO.

01:02:58
A little bit more than it's open

01:03:00
source or enterprise.

01:03:02
Okay.

01:03:03
So ARMO is a

01:03:05
cybersecurity company.

01:03:07
Was founded.

01:03:09
The co-founders are Shauli Rosen,

01:03:11
who is now our CEO, and Ben

01:03:13
Hirschberg, who is

01:03:14
our CTO, and another co-founder

01:03:17
who's now on the board

01:03:18
called Leonid Sandler.

01:03:25
Originally, now Leonid and Ben

01:03:28
come from cybersecurity.

01:03:29
They've been doing

01:03:30
it since the 90s.

01:03:33
And originally they built out a

01:03:36
really, really,

01:03:37
really good product that

01:03:40
required installing

01:03:41
an agent in a cluster.

01:03:43
It was highly intrusive.

01:03:46
It was very resource intensive.

01:03:48
It might've been a good idea, but

01:03:49
it was like maybe, I

01:03:52
don't know, five years

01:03:52
ahead of its life because that was

01:03:55
in the days where

01:03:56
agent-less was the thing.

01:03:59
And it kind of, it became a thing.

01:04:04
And then what happened was that

01:04:06
NSA CISA came out with

01:04:08
the guidelines for

01:04:10
hardening Kubernetes.

01:04:12
Yeah.

01:04:12
That was in 2021, August of 2021.

01:04:18
And they grabbed that idea and

01:04:21
they built an open source

01:04:22
misconfiguration scanner based on

01:04:24
that framework and

01:04:26
that's Kubescape.

01:04:27
And they built out that and it

01:04:30
came out and it

01:04:31
went crazy within days.

01:04:33
It was like the star chart was

01:04:35
nearly perpendicular.

01:04:38
It was, it was crazy.

01:04:39
It got to thousands of stars

01:04:41
within really days.

01:04:43
By the way, we are waiting to get

01:04:46
to 10 stars.

01:04:48
So if anybody uses and likes us,

01:04:50
please, we want,

01:04:52
we really, really,

01:04:53
really want to

01:04:53
celebrate that 10K milestone.

01:04:58
But we really reached, I don't

01:05:00
know, 1000, 3000, 5000 stars

01:05:03
very, very quickly.

01:05:05
And then we added the more

01:05:09
framework through the

01:05:12
misconfiguration

01:05:12
scanner, which include my first

01:05:15
class, which

01:05:16
include CIS benchmark.

01:05:18
I mean, everybody

01:05:19
uses the benchmark.

01:05:22
And these were all things that

01:05:23
allowed people to

01:05:25
easily adhere to these

01:05:27
frameworks and help with the

01:05:30
continuous compliance.

01:05:34
But you can't, I don't

01:05:35
know, Alice in Wonderland.

01:05:37
I worked with Lewis Carroll.

01:05:39
You need to run in order to stay

01:05:41
in place, said the

01:05:42
red queen to Alice.

01:05:44
So we had to continue to develop

01:05:46
the product into

01:05:46
a platform because

01:05:47
the misconfiguration

01:05:48
scanner is not enough.

01:05:50
And then we went

01:05:50
into a CD scanning.

01:05:54
Image scanning.

01:05:55
So there's image scanning,

01:05:56
repository scanning, scan the cluster.

01:05:59
And we also have an agent-less

01:06:02
flavor, which was the

01:06:04
original way we worked.

01:06:05
And then we decided to, even

01:06:07
though past

01:06:08
experience, we saw that the

01:06:09
market was good for that, an agent

01:06:11
as well, an operator

01:06:13
that you put on your

01:06:14
cluster, because things that you

01:06:16
can see from inside the cluster

01:06:17
are not the same

01:06:18
as things that you can see from

01:06:19
outside the cluster.

01:06:20
And that's really important in

01:06:21
terms of security, because you

01:06:23
don't want blind spots.

01:06:24
You want to have all

01:06:25
your bases covered.

01:06:26
If I were to use an American

01:06:27
sports analogy.

01:06:29
So you want to have

01:06:30
everything covered.

01:06:32
So that's how

01:06:33
Kubescape continued to develop.

01:06:36
At the end of 2023, or yeah, it

01:06:38
was December of 2023, no, sorry,

01:06:40
December of 2022.

01:06:43
We were accepted, Kubescape was

01:06:44
accepted by the CNCF as a

01:06:46
sandbox project.

01:06:48
First, a

01:06:48
misconfiguration scanner in the CNCF.

01:06:53
And we're still there and we're

01:06:56
happy and we're growing and we're

01:06:58
at a bid for incubation.

01:06:59
So if I do another plug here now,

01:07:01
if you're using Kubescape and you

01:07:02
love it, please add

01:07:03
yourself to the adopters list

01:07:04
because we want to get to

01:07:05
incubation in 2024.

01:07:08
So we're kind of, we only have

01:07:10
seven months to go.

01:07:11
So yeah, please help us with that.

01:07:13
And what happened when we went

01:07:19
into, when Kubescape was accepted

01:07:21
into the CNCF, we had to

01:07:23
break it out of our enterprise

01:07:25
offerings, out of

01:07:26
our commercial offering.

01:07:28
So we broke it out and

01:07:29
now we have two offerings.

01:07:30
We have ARMO platform, which is the

01:07:32
enterprise offering.

01:07:33
It's either SaaS or as a private

01:07:36
installation, whatever works.

01:07:38
And of course, Kubescape, which is

01:07:39
open source, free for

01:07:40
all anybody can use or

01:07:42
contribute and seems that people

01:07:45
really know and love Kubescape.

01:07:47
But this is the impression that I

01:07:48
got from when I came

01:07:50
back from Paris, at the

01:07:52
KubeCon, I mean, people stopped at

01:07:53
the ARMO booth and it goes, oh,

01:07:54
you're a Kubescape.

01:07:56
So yeah, Kubescape is

01:07:57
very, is very known.

01:07:59
It's a known brand and people seem

01:08:00
to like it, which is great.

01:08:02
Right, right.

01:08:03
So as I said, we just had a guest,

01:08:06
like, I think two weeks

01:08:08
ago, Brian Vermeer from

01:08:11
Snyk, I just learned it's

01:08:13
actually pronounced Snyk.

01:08:16
All right.

01:08:18
And they're also in

01:08:20
the security space.

01:08:21
But from my understanding, ARMO is

01:08:23
slightly different.

01:08:24
So Snyk mostly looks at like the

01:08:26
developer and the build pipeline,

01:08:30
trying to make sure

01:08:32
that all possible vulnerabilities

01:08:34
are found before you

01:08:38
actually deploy. That

01:08:40
common coding mistakes, like the

01:08:44
typical SQL injection, all that

01:08:46
kind of stuff is

01:08:47
caught before it actually can get

01:08:49
into production.

01:08:50
But with the onsite or continuous

01:08:54
online scanning, whatever you want

01:08:56
to call it, ARMO

01:08:57
is on the other side

01:08:59
of these things, right?

01:09:00
So why would you need that?

01:09:03
Why would you want that, like,

01:09:05
this continuous scanning?

01:09:07
I mean, if there was no security

01:09:09
issue, why would there be one in

01:09:11
production at some point?

01:09:13
Okay, so first, let's kind of dial

01:09:16
this a little back.

01:09:18
Snyk looks at things from..

01:09:19
Snyc talks about themselves as an app

01:09:21
tech company, and they

01:09:22
look at things from the workload

01:09:24
or application point of view, and

01:09:27
then they work their way

01:09:28
down. And they get informed by

01:09:34
information from

01:09:35
cloud providers, etc.

01:09:40
Armo is the other way around. We

01:09:43
start from the infrastructure.

01:09:46
Kubernetes infrastructure is like

01:09:48
something that has

01:09:49
never been before.

01:09:51
I mean, Kubernetes is different.

01:09:53
You can't use legacy processes and

01:09:58
tools in order to scan your Kubernetes

01:10:00
because you just don't get

01:10:02
everything that you need.

01:10:03
Kubernetes is ephemeral, it scales

01:10:05
up, it scales down.

01:10:06
Containers don't last as long, so

01:10:08
you don't have a

01:10:08
time to test them.

01:10:10
There's a lot of things that you

01:10:11
could do in the past and you can't

01:10:13
do with Kubernetes.

01:10:14
So the way we look at securing

01:10:16
Kubernetes and by extension the

01:10:20
applications or the workloads

01:10:21
running on it is the fact that we

01:10:23
start from the from

01:10:27
the infrastructure.

01:10:29
We work off of those frameworks,

01:10:32
best practices that we talked

01:10:33
about, and we use

01:10:35
runtime to inform

01:10:38
our security because one of the

01:10:41
main problems that people securing

01:10:46
Kubernetes has is the fact that

01:10:48
if they work according to best

01:10:50
practices, their applications

01:10:51
break or may break or break at

01:10:54
some point. And what you need to do is

01:10:57
understand application behavior

01:10:59
and then ignore the

01:11:02
infrastructure informed by that.

01:11:06
So it's sort of a

01:11:07
different perspective.

01:11:08
We kind of do bottom up and they

01:11:10
and Snyk the top down and we kind

01:11:13
of meet at the application, I

01:11:14
would say, I guess, because I

01:11:16
don't think Snyk goes all the way

01:11:18
down to Kubernetes and we don't go

01:11:21
all the way up to the SaaS

01:11:23
or all of those four little

01:11:26
acronyms that

01:11:27
aren't exactly in the

01:11:31
Kubernetes world,

01:11:32
but over Kubernetes.

01:11:33
So as a company, I actually want

01:11:37
both tools, right?

01:11:38
I want the development side, the

01:11:40
bottom up to make sure that I

01:11:42
don't have well,

01:11:45
that I catch as much

01:11:47
as possible before even

01:11:48
going into production.

01:11:49
And I want the top down approach

01:11:51
in production to make sure that

01:11:53
nothing happens

01:11:54
at runtime, because

01:11:56
I think ARMO also does compliance

01:11:58
testing in terms of that my

01:12:00
policies are correct.

01:12:02
It does...

01:12:05
It looks for misconfiguration.

01:12:06
So it looks much more on the

01:12:08
operational side, stuff that a lot

01:12:10
of the other

01:12:11
tools, I think, will not

01:12:12
necessarily catch easily.

01:12:15
Correct.

01:12:16
ARMO looks again, we are there

01:12:18
throughout the software

01:12:19
development lifecycle from the

01:12:20
beginning, even to

01:12:22
the point where you can do

01:12:23
registery scanning and repo

01:12:25
scanning and

01:12:26
image scanning before.

01:12:28
And then as you write things and

01:12:29
as you build out your pipelines,

01:12:31
you put security gateways in the

01:12:33
pipelines using ARMO.

01:12:36
And an interesting thing, we have

01:12:39
started to leverage eBPF a lot

01:12:41
from many of the

01:12:42
things that we do.

01:12:44
In order to reduce the

01:12:47
signal-to-noise ratio, one of the

01:12:49
problems that there is

01:12:50
in the world of DevOps

01:12:51
and in the operations is alert

01:12:54
fatigue, a lot of false positives.

01:12:58
And people,

01:12:59
they're so overwhelmed.

01:13:02
And there's also a missing piece,

01:13:05
because again, even in the world

01:13:07
of CVEs, when

01:13:09
you're judging things

01:13:11
only by their CVSS, only by the

01:13:13
severity and the score of the CVE,

01:13:17
then you might not

01:13:18
be as efficient as

01:13:19
you need to be.

01:13:20
Because sometimes you have a high

01:13:22
severity vulnerability, somewhere,

01:13:25
that doesn't even get loaded

01:13:27
into memory.

01:13:28
So it's not a problem that you

01:13:29
have to deal with now.

01:13:31
You can deal with it somewhere in

01:13:33
the future when you have time,

01:13:35
which is never,

01:13:36
because nobody ever

01:13:37
has time.

01:13:39
But the idea is, again, having

01:13:42
production informing what happens

01:13:45
in operation by

01:13:46
saying, "Okay, this

01:13:48
way the application or the

01:13:49
workload needs to work, and this

01:13:53
is why I care about this

01:13:55
vulnerability and not

01:13:56
that vulnerability."

01:13:57
Right, right.

01:13:58
Now, speaking of that, ARMO is

01:14:01
working on introducing, we already

01:14:03
have this in beta

01:14:04
in Kubescape, but it's

01:14:05
coming out at ARMO as well, on

01:14:08
cloud native detection and

01:14:10
response, like

01:14:11
runtime, or for runtime.

01:14:13
So we have built out, since we've

01:14:16
been working with the workload,

01:14:18
since we've been

01:14:18
using eBPF to see how

01:14:20
applications are supposed to act

01:14:22
so that we can secure the

01:14:23
infrastructure

01:14:24
without breaking the

01:14:24
application, what we're doing now

01:14:27
is saying, "Okay, so now we know

01:14:29
how the application

01:14:29
needs to act", so I can

01:14:32
actually alert you on when it's

01:14:34
acting abnormally, and then we

01:14:36
have anomaly detection.

01:14:37
I can actually detect the

01:14:40
fingerprints of malware, and then

01:14:43
I can flag that and

01:14:45
say, "Look, this might be

01:14:47
problematic."

01:14:47
You might be needing to look at

01:14:49
this because you might have a

01:14:50
virus, because people

01:14:51
might be scanning CVEs.

01:14:53
And sorry for the 90s reference,

01:14:55
but I'm a Gen X-ers, people might

01:14:58
be scanning for CVEs,

01:14:59
but they're not looking for

01:14:59
viruses on images.

01:15:01
And that's just the problem

01:15:02
waiting to happen.

01:15:04
Especially with something like the

01:15:06
XZ issue just recently.

01:15:08
There you go.

01:15:10
Yeah.

01:15:10
Yeah.

01:15:11
And I think that probably opened

01:15:13
the eyes of a lot of people, that

01:15:16
to what extent or to what length

01:15:18
people go to inject

01:15:20
stuff into your application and

01:15:22
take over either your build

01:15:24
pipeline or your eventual

01:15:25
production, I think in the

01:15:27
XZ situation, it was like a

01:15:29
backdoor that would eventually

01:15:31
make it into

01:15:32
production, so you have access to

01:15:34
production systems.

01:15:36
Yeah, I agree.

01:15:37
And you said another important

01:15:38
thing, and I'm coming from a

01:15:39
strong Java background.

01:15:41
It's about dynamically loading

01:15:45
libraries or dependencies.

01:15:47
And Java was like the prime

01:15:48
example in the past.

01:15:49
Not everything you had in your

01:15:50
class path was necessarily loaded

01:15:52
into a RAM or into memory.

01:15:55
But you have the same thing for

01:15:56
JavaScript, for PHP, for Python,

01:16:00
and especially JavaScript,

01:16:01
TypeScript, Python.

01:16:02
Those are like the big comers, not

01:16:05
newcomers, but the big comers or

01:16:07
upcomers in terms

01:16:09
of dynamic languages.

01:16:11
So yeah, I get that.

01:16:12
That is really interesting in the

01:16:15
sense of you look at runtime and

01:16:18
just because something is in your

01:16:19
image doesn't necessarily

01:16:20
mean it's bad.

01:16:21
It's going to be bad the second

01:16:23
it's loaded into memory and is

01:16:25
available to the application.

01:16:26
That makes a lot of sense.

01:16:29
So you said ARMO runs inside the

01:16:34
Kubernetes cluster, right?

01:16:35
There's an operator, I guess.

01:16:38
Yeah.

01:16:39
So do I need to be

01:16:42
prepared of anything?

01:16:43
Is there anything special I need

01:16:44
to think about or is it literally

01:16:46
you drop it in, and because

01:16:48
it's eBPF and agent-less

01:16:50
it does all the magic for me and I

01:16:51
don't have to

01:16:52
think about it at all.

01:16:53
Like magic.

01:16:54
Yeah, the idea is for

01:16:55
you not to think about it.

01:16:57
However, we do give users tools.

01:17:00
Again, we're very cognizant of

01:17:02
alert fatigue because what happens

01:17:04
is people are overwhelmed.

01:17:06
So they'll either work themselves

01:17:08
to burnout or

01:17:09
start ignoring things.

01:17:11
Neither is a good option.

01:17:13
Okay, so what we want to do is

01:17:16
thinking about the usability about

01:17:20
the processes, not just the UX,

01:17:22
but about the

01:17:22
processes that are involved.

01:17:25
So we have

01:17:26
configurable security controls.

01:17:28
You can quiet alerts for specific

01:17:32
things, either forever, because

01:17:34
that's just the way this is a risk

01:17:36
you're willing to take.

01:17:38
Or that's just the way the app

01:17:40
works and you can't change it or

01:17:42
you're not changing for now.

01:17:45
So you can configure the controls,

01:17:46
you can set down alerts for a

01:17:49
configurable period

01:17:50
of time or forever.

01:17:52
And all of these things are in

01:17:54
order to bring you to the point

01:17:56
where you really, really, really

01:17:59
focus on the things that you need.

01:18:02
And you increase the efficiency of

01:18:04
your security work.

01:18:05
You only fix what

01:18:06
needs are these things.

01:18:08
A good example

01:18:08
here is a task path.

01:18:11
People, I mean, it's called a attack

01:18:13
chain, a attack vector, kill

01:18:15
chain, there's lots of

01:18:16
terminology around the same thing.

01:18:18
But basically what it says is that

01:18:19
there's a step by step by step

01:18:21
task or thing that an attacker

01:18:24
would use in order to

01:18:25
compromise your entity.

01:18:29
There are different entry points

01:18:30
that are caused by either

01:18:32
misconfigurations or viruses or

01:18:35
sorry, or vulnerabilities, etc.

01:18:37
So what we do is we provide a

01:18:41
visualization of a possible attack

01:18:45
path and say, ok, it's sort of a

01:18:48
I'm hesitant to use the word node

01:18:51
because Kubernetes,

01:18:52
but it's kind of a node of the

01:18:56
subway map sort of thing where you

01:19:00
can basically, you can check for

01:19:03
each node what you need to fix.

01:19:05
Sometimes there's one node where

01:19:08
you need to fix one

01:19:09
misconfiguration and you're done

01:19:12
and you immediately hardened your

01:19:14
infrastructure to the point where

01:19:16
the attack path is blocked.

01:19:19
You of course, you need to fix

01:19:21
everything around that.

01:19:23
But the first thing you need to do

01:19:24
is to make sure

01:19:25
that you're secure now.

01:19:28
And that really helps and it

01:19:29
increases the efficiency.

01:19:31
Right. So you're basically cutting

01:19:32
off the chain of possible of

01:19:34
possibilities so that even if a

01:19:37
person gets to that point, it's

01:19:39
now stopped in its tracks, basically.

01:19:43
All right. That's interesting.

01:19:45
That sounds that

01:19:46
sounds very useful.

01:19:49
Yeah, I think that's an important

01:19:52
thing because that's that's

01:19:53
basically our North Star where

01:19:55
we're saying we know

01:19:56
that security work is hard.

01:19:58
We know that it's been delegated

01:20:00
to DevOps people that don't

01:20:02
necessarily like it or want to do

01:20:04
it and are overwhelmed with other

01:20:06
things and want to do things that

01:20:07
they find more

01:20:07
interesting, which is great.

01:20:09
Although, you know, security

01:20:10
people don't take me personally, I

01:20:12
work for a security company.

01:20:13
I think it's interesting. But my

01:20:16
point is, is that and this is I'm

01:20:19
sorry, this is a Snyk tagline.

01:20:20
Sorry, Brian. But but you want

01:20:24
security tools that

01:20:26
DevOps people will use.

01:20:29
And that's basically

01:20:30
what we're doing at ARMO.

01:20:31
We want to create a security tool that

01:20:33
DevOps people will use

01:20:34
and security people will love.

01:20:36
And again, sorry, Snyk.

01:20:39
That's basically the same thing, but

01:20:40
we're coming from the bottom, your from the top.

01:20:41
I to be to be honest, I think that

01:20:43
is that is perfectly fine.

01:20:45
They probably appreciate the call

01:20:47
out, to be honest.

01:20:50
Right. So because we're almost

01:20:54
running out of time, we're pretty

01:20:55
much running out

01:20:55
of time right now.

01:20:57
Do you think that there is or what

01:20:59
is your feeling about security as

01:21:01
a thought at companies?

01:21:03
Do they like

01:21:04
neglect it a little bit?

01:21:06
Do they see it as

01:21:09
important as it should be?

01:21:10
What is your

01:21:11
feeling? Is there headroom?

01:21:14
Well, I spend a lot of time on

01:21:17
subreddits of security people.

01:21:20
These people are very unhappy.

01:21:23
I mean, some of them are are

01:21:24
really great professionals that

01:21:28
want to do a good job and they

01:21:29
feel they're being discounted.

01:21:32
Again, there's this problem where

01:21:35
there are tools that they want to

01:21:37
use, but the DevOps that the

01:21:38
people that they serve them to

01:21:41
don't don't want to use.

01:21:42
So there needs to

01:21:43
be a conversation.

01:21:45
Security is important.

01:21:47
Ok, F16s runs on Kubernetes.

01:21:50
Water plants, sewage plants, a lot

01:21:55
of important

01:21:55
infrastructure runs on Kubernetes.

01:21:58
So securing

01:21:59
Kubernetes is very important.

01:22:02
Now, in order for that to happen,

01:22:04
everybody needs to

01:22:05
get on board with that.

01:22:06
And the only way to get on board

01:22:08
with that is to have that

01:22:09
conversation and to say, ok, this

01:22:11
is what needs to be done.

01:22:13
This is what we

01:22:14
think you need to do it.

01:22:16
Are you are you on board? And if

01:22:18
not, how do we get you on board?

01:22:20
And one of the ways to get you on

01:22:22
board is OK, look, you can put

01:22:25
this in the CICD pipeline, forget

01:22:27
about it until it reminds you.

01:22:29
You can scan a repository every

01:22:32
time you pull for it or an image

01:22:33
every time you pull it.

01:22:35
You can you have a VSCode plugin

01:22:37
or a GitHub action.

01:22:40
And all of these things are in

01:22:42
order to have that conversation

01:22:44
and say, look,

01:22:45
security is important,

01:22:46
but we don't want to distract you

01:22:47
from things that

01:22:48
you find important.

01:22:49
And that's a conversation that has

01:22:51
to happen, has to

01:22:52
happen all the time.

01:22:53
Security doesn't end.

01:22:55
Right, right. Ok, last question.

01:22:58
Any predictions or any thoughts on

01:23:01
the future of security?

01:23:03
Anything you see on the horizon

01:23:05
that is upcoming or that needs to

01:23:08
happen from your perspective?

01:23:11
Runtime is upcoming.

01:23:14
It's like two years, even two

01:23:16
years ago, what's the thing?

01:23:18
Nobody was talking about anything

01:23:20
else except shift left security.

01:23:22
You shift left. DevOps should to do it.

01:23:25
We're done. We said.

01:23:28
And we found that even if one

01:23:30
thing gets through our shift left,

01:23:32
our production

01:23:33
workloads are in danger.

01:23:35
So next thing on the menu is

01:23:38
runtime security.

01:23:40
It's a beautiful last sentence.

01:23:44
Very, very nice.

01:23:45
Thank you for being here.

01:23:46
It was a pleasure having you.

01:23:50
And I hope we we're going to see.

01:23:53
I think we never met in person,

01:23:54
which is which is really weird.

01:23:57
But since we're both in the

01:23:58
Kubernetes space, there

01:24:00
is a good chance we do.

01:24:01
And I hope we really do.

01:24:04
So thank you very

01:24:05
much for for being here.

01:24:07
Thanks so much for

01:24:07
having me, Chris. Great.

01:24:09
For the audience

01:24:10
next week, next episode.

01:24:12
I hope you're listening again.

01:24:14
And thank you very much

01:24:15
for being here as well.

01:24:16
Thank you very much. See ya.

01:24:19
The cloud commute podcast is sponsored by

01:24:21
simplyblock your own elastic

01:24:22
block storage engine for the cloud.

01:24:24
Get higher IOPS and low predictable

01:24:26
latency while bringing down your

01:24:28
total cost of ownership.

01:24:29
www.simplyblock.io