The Sched app allows you to build your schedule, but it is not a substitute for event registration. To participate in the sessions, you must be registered for OpenSSF Community Day India 2025.If you have not registered but would like to join us, please go to the event registration pageto purchase a registration.
Please note: This schedule is automatically displayed in India Standard Time.To see the schedule in your preferred timezone, please select from the drop-down located at the bottom of the menu to the right.
Schedule is subject to change.
Sign up or log in to add sessions to your schedule and sync them to your phone or calendar.
Podman is a daemonless, open source, Linux native tool designed to make it easy to find, run, build, share and deploy applications using Open Containers Initiative (OCI) Containers and Container Images. Enforcing runtime security to protect against threats like RCE and privilege escalation requires a steep learning curve to implement security primitives like apparmor, selinux and seccomp. It becomes very difficult to achieve simplistic policy expression. This is where kubearmor comes in.
This talk will explore how to implement runtime security on podman containers using kubearmor.
Kubearmor uses native Kubernetes resources and YAML for policy definition, allowing Kubernetes-style composition which is more intuitive for Kubernetes users, allowing defining desired needs easy.
Rishabh is passionate about low-level systems, cloud-native security, and developer tooling. He is a approver and key contributor to KubeArmor, a CNCF Sandbox project, and works as a Software Engineer at AccuKnox. With experience ranging from enhancing Kubernetes runtime security... Read More →
We often hear about chaos engineering in the context of reliability, but what if we applied that same philosophy to security? In this session, I’ll explore the emerging field of Security Chaos Engineering. In this innovative practice, we intentionally inject failures and simulate attacks to uncover hidden security weaknesses before adversaries do.
Using open source tools like ChaosMesh, LitmusChaos, and KubeArmor, I'll demonstrate how teams can proactively test assumptions about their security posture. From simulating pod compromise in Kubernetes to testing firewall rule effectiveness under duress, the session will walk through real-world scenarios where controlled chaos leads to deeper system hardening.
Rather than reacting to incidents, what if we could break things on purpose—and make our systems safer.