Container Drift, Base Images & CMMC: Zero Trust in Practice (w/ Anchore + InfusionPoints)
How do you turn zero trust from a slogan into day-to-day guardrails—especially when you’re chasing CMMC, FedRAMP, or DoD requirements? In this session, Josh Bressers (VP of Security, Anchore), Jason Redding (InfusionPoints), and host Alan Pope (Director of DevRel, Anchore) go hands-on with modern software supply chain defenses: image provenance, signed artifacts, drift detection, hardened base images, KEV-based policy gates, SBOMs, and Kubernetes admission controls.
What you’ll learn
Zero Trust, distilled: “Never trust, always verify” applied to identities, devices, workloads, networks—and especially data
CMMC v2 updates: How changes affect verification, SLAs, and evidence requirements
Provenance that auditors love: Checksums, base-image ancestry, approved registries, and policy controls (incl. KEV auto-fail)
Stop container drift: Detect package/file changes between image versions and enforce guardrails in CI/CD
Vulnerability management that scales: SBOM-driven scanning (incl. fixes/SLAs), reports, and exception handling for POA&Ms
Hardened base images: Why “minimal” ≠ “optional” for compliance (and how it slashes vuln counts)
From demo to day-2 ops: Anchore CLI/API, GitHub Actions, and Kubernetes admission controller patterns
Who should watch:
Security & platform engineers, DevSecOps, compliance leads (CMMC/FedRAMP/DoD), and auditors who need actionable, evidence-backed controls for containers and supply chain risk.
Speakers
Josh Bressers, VP of Security, Anchore
Jason Redding, InfusionPoints
Alan, Director of DevRel, Anchore (Host)
Resources & next steps
Learn more about Anchore (SBOMs, policy, supply chain security)
www.Anchore.com
Talk with InfusionPoints about Zero Trust, CMMC, and FedRAMP programs
www.InfusionPoints.com
Connect with Jason and Josh on LinkedIn for follow-ups
/ jasonreddingasu
/ joshbressers
Информация по комментариям в разработке