SlideShare a Scribd company logo
1 of 54
Download to read offline
CTO, Wheel Systems

Founder of the ZeroTrust Initiative
Paweł	Jakub	Dawidek	
<pjd@ZeroTrust.org>	<p.dawidek@wheelsystems.com>	<pjd@FreeBSD.org>
The	ZeroTrust	Initiative	
There	is	no	Security	without	Transparency
The	ZeroTrust	Initiative	aims	
to	improve	overall	IT	security	by	
removing	forced	trust
u we	are	forced	to	trust	the	vendors
Problems…
u we	are	forced	to	trust	the	vendors	
u no	source	code	for	proprietary	products
Problems…
u we	are	forced	to	trust	the	vendors	
u no	source	code	for	proprietary	products	
u no	reproducible	builds	for	open-source
Problems…
u we	are	forced	to	trust	the	vendors	
u no	source	code	for	proprietary	products	
u no	reproducible	builds	for	open-source	
u trusted	build	environment?	
u secure	distribution?	
u reproducible	installs?
Problems…
Who	is	right?
„If	it	cannot	be	veri:ied,	
it	cannot	be	secure”
Why	is	that	important,	exactly?
„Be	suspicious	of	commercial	encryption	software,	especially	from	large	
vendors.	My	guess	is	that	most	encryption	products	from	large	US	
companies	have	NSA-friendly	back	doors,	and	many	foreign	ones	probably	
do	as	well.	It's	prudent	to	assume	that	foreign	products	also	have	foreign-
installed	backdoors.	Closed-source	software	is	easier	for	the	NSA	to	
backdoor	than	open-source	software.”	
Bruce	Schneier
No	source	code
„Thanks	to	the	recent	NSA	leaks,	people	are	more	worried	than	ever	that	
their	software	might	have	backdoors.	If	you	don't	believe	that	the	software	
vendor	can	resist	a	backdoor	request,	the	onus	is	on	you	to	look	for	a	
backdoor.	What	you	want	is	software	transparency.”	
prof.	Edward	W.	Felten
No	source	code
u compilers	
u compilation	options	
u headers	
u libraries	
u time	
u build	environments	metadata	
u Lile	system	metadata	in	archives	
u signatures	
u proLile-guided	optimizations
No	reproducible	builds:	different…
Source:	Mike	Perry,	Seth	Schoen
u How	small	can	a	backdoor	be?
No	reproducible	builds
Source:	Mike	Perry,	Seth	Schoen
u How	small	can	a	backdoor	be?
No	reproducible	builds
OpenSSH	3.0.2	(CVE-2002-0083)	-	privilege	escalation	to	root	
- if (id < 0 || id > channels_alloc) {
+ if (id < 0 || id >= channels_alloc) {
Source:	Mike	Perry,	Seth	Schoen
u How	small	can	a	backdoor	be?
No	reproducible	builds
cmpl $0x0,0x8(%ebp)
js 16
mov 0x4,%eax
cmp %eax,0x8(%ebp)
jle 30
mov 0x8(%ebp),%eax
mov %eax,0x4(%esp)
movl $0x4c,(%esp)
call 25
Assembly
cmpl $0x0,0x8(%ebp)
js 16
mov 0x4,%eax
cmp %eax,0x8(%ebp)
jl 30
mov 0x8(%ebp),%eax
mov %eax,0x4(%esp)
movl $0x4c,(%esp)
call 25
Source:	Mike	Perry,	Seth	Schoen
u How	small	can	a	backdoor	be?
No	reproducible	builds
39 45 08 7e 1a 8b 45
Binary
39 45 08 7c 1a 8b 45
Source:	Mike	Perry,	Seth	Schoen
u How	small	can	a	backdoor	be?
No	reproducible	builds
39 45 08 7e 1a 8b 45
Binary
39 45 08 7c 1a 8b 45
01111110 01111100
Source:	Mike	Perry,	Seth	Schoen
u How	small	can	a	backdoor	be?
No	reproducible	builds
39 45 08 7e 1a 8b 45
Binary
39 45 08 7c 1a 8b 45
01111110 01111100
A	single	bit!
Source:	Mike	Perry,	Seth	Schoen
u Huge	effort	to	verify	TrueCrypt	
u On-going	work	on	reproducible	builds	(Tor,	Debian)	
u More	awareness	among	developers	needed	
u ReLlections	on	Trusting	Trust,	1984	Ken	Thompson	
u Countering	Trusting	Trust	through	Diverse	Double-Compiling,	David	A.	
Wheeler
No	reproducible	builds
u How	can	you	feel	secure	without	it?
Complete	end-to-end	independent	veriLication
Development
Build
Distribution
Installation
Development
trusted	development	environment
Build
Distribution
Installation
trusted	build	environment	
reproducible	builds	
trusted	signing	environment
signed	source	
signed	binaries	
binary	transparency
secure	installation	of	keys	
signatures	veriLication	
reproducible	installation
u publicly	available	algorithms	
u extensive	peer	review	
u publicly	available	cryptoanalysis	results
Cryptography
u secret,	home-grown	crypto	uncommon
Cryptography:	the	result?
u secret,	home-grown	crypto	uncommon	
u the	strongest	link	in	the	chain
Cryptography:	the	result?
u agencies	can	ask	or	force	organizations	to	put	backdoors
Why	not	to	trust?
u agencies	can	ask	or	force	organizations	to	put	backdoors	
u people	can	be	criminals
Why	not	to	trust?
u agencies	can	ask	or	force	organizations	to	put	backdoors	
u people	can	be	criminals	
u people	can	be	bribed
Why	not	to	trust?
u agencies	can	ask	or	force	organizations	to	put	backdoors	
u people	can	be	criminals	
u people	can	be	bribed	
u people	can	be	intimidated
Why	not	to	trust?
u agencies	can	ask	or	force	organizations	to	put	backdoors	
u people	can	be	criminals	
u people	can	be	bribed	
u people	can	be	intimidated	
u people	can	be	incompetent
Why	not	to	trust?
u agencies	can	ask	or	force	organizations	to	put	backdoors	
u people	can	be	criminals	
u people	can	be	bribed	
u people	can	be	intimidated	
u people	can	be	incompetent	
u people’s	computers	can	be	hacked
Why	not	to	trust?
u don’t	destroy	business
The	Solution
u don’t	destroy	business	
u propose	a	license	for	auditing/reporting	purpose
The	Solution
u don’t	destroy	business	
u propose	a	license	for	auditing/reporting	purpose	
u encourage	and	promote	reproducible	builds
The	Solution
u don’t	destroy	business	
u propose	a	license	for	auditing/reporting	purpose	
u encourage	and	promote	reproducible	builds	
u talk	to	toolchain	vendors
The	Solution
u don’t	destroy	business	
u propose	a	license	for	auditing/reporting	purpose	
u encourage	and	promote	reproducible	builds	
u talk	to	toolchain	vendors	
u talk	to	platform	vendors	to	make	veriLication	possible
The	Solution
u don’t	destroy	business	
u propose	a	license	for	auditing/reporting	purpose	
u encourage	and	promote	reproducible	builds	
u talk	to	toolchain	vendors	
u talk	to	platform	vendors	to	make	veriLication	possible	
u propose	ways	to	protect	IP
The	Solution
The Ultimate Goal
ZeroTrust	as	a	natural	element	of	
security	hygiene
Though	questions	/	
Commom	concerns
V:	We	make	money	by	selling	out	software	and	don’t	want	to	destroy	our	
business	by	giving	it	away	for	free.	
ZT:	The	ZTI	doesn’t	expect	your	company	to	start	giving	products	for	free.	
ZTI	will	propose	a	license	that	will	allow	to	release	the	source	code,	but	
only	for	auditing	and	reporting	purposes.
Common	concerns
V:	We	don’t	want	our	competitors	to	use	our	code	which	we	will	release	as	
Open	Source.	
ZT:	With	ZTI	license	that	would	be	illegal.	Your	competitor	will	also	have	
disadvantage,	because	of	not	releasing	the	code.
Common	concerns
V:	Our	current	code	is	a	mess.	We	also	have	binary	blobs	from	other	
vendors	and	no	chance	to	get	the	source	code	for	that.	
ZT:	Then	don’t	release	it.	We	fully	understand	it	might	be	too	expensive	
and	too	risky	to	release	current	source	code.	But	when	you	start	building	a	
new	product,	do	it	according	to	the	ZTI	ideology.
Common	concerns
V:	It	won’t	work,	nobody	will	be	interested,	we	are	too	big	to	try.	
ZT:	Start	in	small	steps.	Release	ZeroTrust	version	of	your	product,	with	
limited	functionality	and	see	what	the	market	will	choose.
Common	concerns
V:	How	about,	to	slow	down	the	competitors,	we	will	release	the	source	
code	some	time	after	releasing	the	binaries?	
ZT:	Bad	idea.	This	means	people	who	care,	will	need	to	wait	for	your	
product	to	become	possible	to	verify.
Common	concerns
V:	Opening	the	source	code	solves	nothing!	No	one	will	ever	be	able	to	
audit	my	entire	code	anyway!	
ZT:	That’s	possible,	of	course,	but	that’s	not	crucial.	People	may	want	to	
audit	the	code	once	they	suspect	something.	Independent	parties	may	
audit	the	code	and	I	can	choose	who	to	trust.	It	is	much	more	risky	to	put	a	
backdoor	into	a	product	with	open	source.
Common	concerns
V:	Open	source	software	less	secure,	because	it	is	easier	to	Lind	security	
bugs.	
ZT:	Yes,	it	is	easier	to	Lind	bugs,	but…
Common	concerns
Time	to	Lind	a	security	bug
Open Source
Closed Source
0m 12m 24m 36m 48m
Agencies Cybercriminals Whitehat community
Common	concerns
Time	the	bug	can	be	exploited	by	Cybercriminals
Open Source
Closed Source
0m 12m 24m 36m 48m
Agencies Cybercriminals Whitehat community
Common	concerns
12m
24m
12m<24m
Time	the	bug	can	be	exploited	by	Government	Agencies
Open Source
Closed Source
0m 12m 24m 36m 48m
Agencies Cybercriminals Whitehat community
Common	concerns
18m
36m
18m<36m
V:	For	my	product	to	work	effectively	I	cannot	disclose	the	source	code.	For	
example	spammers	will	quickly	learn	how	to	bypass	my	anti-spam	solution.	
ZT:	Sure,	it	is	your	call.	Release	as	much	source	code	as	you	can	and	let	your	
customers	decide	if	this	explanation	convinces	them	or	maybe	they	will	
prefer	ZT	alternative.	You	may	also	design	your	software	so	that	binary-only	
functionality	is	closed	in	a	tight	sandbox	(look	out	for	side-channel	attacks).
Common	concerns
V:	How	can	the	ZTI	ideology	be	applied	to	cloud	service	providers?	
ZT:	We	don’t	know	yet,	but	tarsnap,	sync.com.
Common	concerns
V:	I’m	a	vendor	from	the	USA	and	after	Edward	Snowden	leaks	nobody	
trusts	me	anymore.	What	do	I	do?	
ZT:	Boy,	do	we	have	great	news	for	you!	Join	the	ZTI	and	rebuild	your	trust!
Common	concerns
u don’t	blindly	trust	the	vendors	
u having	source	code	is	always	better,	but	be	sure	the	source	code	matches	
the	binaries	
u start	looking	for	ZeroTrust	products	
u support	vendors	that	apply	ZTI	even	if	they	provide	alternative	versions	
of	their	products	-	show	them	that	you	care	
u imagine	your	whole	IT	infrastructure	build	on	top	of	ZeroTrust	products	
and	it	will	be	so!
To	sum	up…
https://www.facebook.com/ZeroTrustInitiative

More Related Content

What's hot

PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSECPLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSECPROIDEA
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019James Wickett
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOpJames Wickett
 
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonSSIMeetup
 
DevSecOps and the New Path Forward
DevSecOps and the New Path ForwardDevSecOps and the New Path Forward
DevSecOps and the New Path ForwardJames Wickett
 
ChaoSlingr: Introducing Security based Chaos Testing
ChaoSlingr: Introducing Security based Chaos TestingChaoSlingr: Introducing Security based Chaos Testing
ChaoSlingr: Introducing Security based Chaos TestingAaron Rinehart
 

What's hot (6)

PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSECPLNOG 5: Eric Ziegast, Zbigniew Jasinski -  DNSSEC
PLNOG 5: Eric Ziegast, Zbigniew Jasinski - DNSSEC
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOp
 
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
 
DevSecOps and the New Path Forward
DevSecOps and the New Path ForwardDevSecOps and the New Path Forward
DevSecOps and the New Path Forward
 
ChaoSlingr: Introducing Security based Chaos Testing
ChaoSlingr: Introducing Security based Chaos TestingChaoSlingr: Introducing Security based Chaos Testing
ChaoSlingr: Introducing Security based Chaos Testing
 

Viewers also liked

Tre modi per aumentare la velocità del tuo Business Website e guadagnare on...
Tre modi per aumentare la velocità del tuo Business Website e guadagnare on...Tre modi per aumentare la velocità del tuo Business Website e guadagnare on...
Tre modi per aumentare la velocità del tuo Business Website e guadagnare on...Matteo Stefan
 
STARTER KIT ORION….un vero e proprio laboratorio elettronico (by FASAR ELETT...
STARTER KIT ORION….un vero e proprio laboratorio  elettronico (by FASAR ELETT...STARTER KIT ORION….un vero e proprio laboratorio  elettronico (by FASAR ELETT...
STARTER KIT ORION….un vero e proprio laboratorio elettronico (by FASAR ELETT...Flavio Falcinelli
 
International exchange workshop - French delegation
International exchange workshop - French delegationInternational exchange workshop - French delegation
International exchange workshop - French delegationeathink
 
TIPOS DE DROGAS
TIPOS DE DROGASTIPOS DE DROGAS
TIPOS DE DROGASsoslea
 
Kannadhasan resume
Kannadhasan resumeKannadhasan resume
Kannadhasan resumeKanna Dhasan
 

Viewers also liked (6)

Tre modi per aumentare la velocità del tuo Business Website e guadagnare on...
Tre modi per aumentare la velocità del tuo Business Website e guadagnare on...Tre modi per aumentare la velocità del tuo Business Website e guadagnare on...
Tre modi per aumentare la velocità del tuo Business Website e guadagnare on...
 
STARTER KIT ORION….un vero e proprio laboratorio elettronico (by FASAR ELETT...
STARTER KIT ORION….un vero e proprio laboratorio  elettronico (by FASAR ELETT...STARTER KIT ORION….un vero e proprio laboratorio  elettronico (by FASAR ELETT...
STARTER KIT ORION….un vero e proprio laboratorio elettronico (by FASAR ELETT...
 
International exchange workshop - French delegation
International exchange workshop - French delegationInternational exchange workshop - French delegation
International exchange workshop - French delegation
 
TIPOS DE DROGAS
TIPOS DE DROGASTIPOS DE DROGAS
TIPOS DE DROGAS
 
Barry_portfolio
Barry_portfolioBarry_portfolio
Barry_portfolio
 
Kannadhasan resume
Kannadhasan resumeKannadhasan resume
Kannadhasan resume
 

Similar to Introduction to the ZeroTrust Initiative

The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineJames Wickett
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)Jan Fried
 
ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020 ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020 Aaron Rinehart
 
Dev secops opsec, devsec, devops ?
Dev secops opsec, devsec, devops ?Dev secops opsec, devsec, devops ?
Dev secops opsec, devsec, devops ?Kris Buytaert
 
Professional WordPress Security: Beyond Security Plugins
Professional WordPress Security: Beyond Security PluginsProfessional WordPress Security: Beyond Security Plugins
Professional WordPress Security: Beyond Security PluginsChris Burgess
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0Amazon Web Services
 
S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_programShannon Lietz
 
Maturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactMaturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactSBWebinars
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Sec devops 2.0 managing your robot army - final
Sec devops 2.0  managing your robot army - finalSec devops 2.0  managing your robot army - final
Sec devops 2.0 managing your robot army - finalJosh Bregman
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Bemorisson
 
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on KubernetesKCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetessparkfabrik
 
SecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot ArmySecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot Armyconjur_inc
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 

Similar to Introduction to the ZeroTrust Initiative (20)

The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Kali linux cookbook
Kali linux cookbookKali linux cookbook
Kali linux cookbook
 
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
Czech Tech Pitch Day - Babel / OKsystem (Martin Kudrnac)
 
ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020 ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020
 
Dev secops opsec, devsec, devops ?
Dev secops opsec, devsec, devops ?Dev secops opsec, devsec, devops ?
Dev secops opsec, devsec, devops ?
 
Secure webdev 3.0
Secure webdev 3.0Secure webdev 3.0
Secure webdev 3.0
 
Professional WordPress Security: Beyond Security Plugins
Professional WordPress Security: Beyond Security PluginsProfessional WordPress Security: Beyond Security Plugins
Professional WordPress Security: Beyond Security Plugins
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_program
 
Maturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High ImpactMaturing DevSecOps: From Easy to High Impact
Maturing DevSecOps: From Easy to High Impact
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Sec devops 2.0 managing your robot army - final
Sec devops 2.0  managing your robot army - finalSec devops 2.0  managing your robot army - final
Sec devops 2.0 managing your robot army - final
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
 
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on KubernetesKCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
KCD Italy 2023 - Secure Software Supply chain for OCI Artifact on Kubernetes
 
SecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot ArmySecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot Army
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Introduction to the ZeroTrust Initiative