Talks and presentations

Software Composition Analysis – Covering Infrastructure as Code

November 14, 2024

Demo, Cybersecurity: Strategic research and industry impact, 3rd edition, Mechelen, Belgium

Demonstration of a Software Composition Analysis (SCA) for Ansible Infrastructure-as-Code plugins. The analysis identifies dependencies on third-party software. The outcome is used to comprehend the software supply chains of Ansible artifacts.

Delivering security by design: testing, supply chain challenges …

November 14, 2024

Breakout session, Cybersecurity: Strategic research and industry impact, 3rd edition, Mechelen, Belgium

In this session, we’ll review the essential tools for managing development dependencies (e.g., Maven, npm), deployment dependencies (e.g., Docker, Kubernetes), and infrastructure configurations (e.g., Ansible, Puppet) in the software supply chain—and highlight the unique security challenges that come with each. We’ll present the latest research into these security challenges, and demystify the inner workings of the newest tools designed to tackle them.

Securing Infrastructure Code for Build and Deployment Environments

October 17, 2023

Breakout session, Cybersecurity: Strategic research and industry impact, 2nd edition, Mechelen, Belgium

DevOps has transformed software development and deployment by promoting seamless collaboration between teams to boost speed, reliability, and innovation. Infrastructure as Code (IaC), managing computing infrastructure through executable source code, plays a central role, ensuring predictability, efficiency, and reliability. For instance, Ansible serves as a versatile IaC tool, simplifying configuration management and automation, while Docker packages apps and their dependencies into isolated containers for consistent execution, and Helm streamlines Kubernetes app management. In this session, we explore IaC security challenges, including Ansible vulnerability detection techniques, Docker container package monitoring, and insights from Helm chart security analysis. Learn how to address security challenges in these popular IaC tools.