#OpenInfraSummit Track: Security

#OpenInfraSummit Track: Security

We are featuring one of the seven Summit tracks—Security. Get your Summit tickets for free and add these sessions to your Summit calendar!

The Open Infrastructure Summit, held virtually for the first time, takes place October 19-23 and includes more than 100 sessions around infrastructure use cases like cloud computing, edge computing, hardware enablement, private & hybrid cloud and security. Thousands of attendees are expected to participate, representing 30+ open source communities and more than 110 countries.

Today, we are featuring one of the seven Summit tracks—Security. Get your Summit tickets for free and don’t forget to add these sessions to your Summit calendar!

Dependency Analytics

  • Presented by Shubham Mathur & Darshan Vandra from Red Hat
  • What can you expect to learn?
    • Via this session, we want to educate all the developers how they can enhance their programming capabilities by using this extension. It would be a great learning curve for students or those who are just out of college as they get to know or learn about aspects of selecting a package in their project, which they usually are not aware of.
  • Add this session to your Summit calendar!

Digital Sovereignty – Why Open Infrastructure Matters

  • Presented by Marius Feldmann from Cloud & Heat Technologies, Kurt Garloff
  • What can you expect to learn?
    • In 2019 the term “digital sovereignty” gained momentum in Europe. The first time in history, several ministries such as the German or French ministry for Economic Affairs, pushed forward initiatives to establish digital sovereignty. In this talk, we will give an interpretation of this important term. Additionally, we will provide an overview of the European initiative GAIA-X. Last but not least, we will point out, why in our opinion neither digital sovereignty nor the goals of the GAIA-X initiative can be achieved without open infrastructures.

Improvements to Identity Federation in Keystone

  • Presented by Kristi Nikolla from Mass Open Cloud
  • What can you expect to learn?
    • Previous and current state of identity federation in keystone
    • Expiring group memberships and how to carry permissions through mapping rules
    • Operations on the federated attributes of a user through the API
    • What identity federation is, why you would use it, and how to set it up
  • Add this session to your Summit calendar!

Introducing Open Enclave

  • Presented by Aeva Black from Microsoft,
  • What can you expect to learn?
    • In this talk, attendees will learn about the work happening in the Confidential Computing Consortium to secure public cloud workloads using hardware trusted execution enclaves (HW TEE’s), a new CPU capability introduced recently by Intel, AMD, and ARM.
    • More specifically, attendees will learn about the Open Enclave SDK project which can be used to write “enclave aware” applications across multiple CPU architectures, and will be given either a tour of the code or a demo of a running application (depending on the luck of the day).
    • Attendees will leave this talk with enough knowledge to write their own Hello World application using Open Enclave.
  • Add this session to your Summit calendar!

Physical tenant separation: evaluation of concepts and proposed implementations

  • Presented by Laura Geisler from secustack GmbH.
  • What can you expect to learn?
    • Listeners will learn about possible approaches of integrating physical separation concepts into OpenStack and the corresponding advantages and disadvantages of each approach. Furthermore, attendees will get an understanding about how the seemingly contradicting approach of introducing physical exclusivity can still fit into the cloud paradigm.
  • Add this session to your Summit calendar!

Security-by-construction: How to weave authorization into modern app stacks using Open Policy Agent

  • Presented by Tim Hinrichs from Styra
  • What can you expect to learn?
    • Three Key Takeaways:
      • How to leverage the open source tools to build policy-as-code guardrails.
      • Best practices from the community for limiting risk.
      • How to shift security left, and bring policy into your development culture.
    • The audience will see working code snippets and live-coding.
  • Add this session to your Summit calendar!

Tackling security challenges with Airship

  • Presented by Alexander Hughes from Accenture
  • What can you expect to learn?
    • What Common Vulnerability Exposures (CVEs) are
    • How to detect CVEs in the Operating System (such as apt packages)
    • How to detect CVEs in programming language dependencies (such as PyPi)
    • How to scan Docker images for these CVEs, as well as viruses
    • Common ways to resolve CVEs
    • The impact a base image has on your image’s securit
  • Add this session to your Summit calendar!

Towards Enclave-as-a-Container with Inclavare containers and Occlum

  • Presented by Yuntong Jin from Intel, Hongliang Tian from Ant Group and Tianjia Zhang
  • What can you expect to learn?
    • This topic will introduce what’s confidential computing, the architecture of Inclavare containers and how it can be deployed in cloud.
  • Add this session to your Summit calendar!

Don’t miss these Summit sessions and get your Summit ticket for free!

Still on the fence?

View the full Summit schedule and check out some most anticipated Summit sessions that you might love!

Participate:

Follow the #OpenInfraSummit hashtag on Twitter, Facebook, LinkedIn and make sure to subscribe to the OpenStack Foundation (OSF) YouTube channel to get exclusive behind-the-scenes content on how the Summit is being organized!

Participate in the conversation on

Twittertwitter.com/OpenStack

Facebookfacebook.com/OpenStack

YouTubeyoutube.com/user/OpenStackFoundation

WeChat ID: OpenStack