Seccomp Security Profiles and You: A Practical Guide - Duffie Cooley, VMware
Cloud Engineering Summit 2020: Kubernetes Seccomp Profiles: A Practical Guide
Kubernetes Security - Seccomp | How to use it to restrict Kernel calls in your Pods
Seccomp(Secure Computing Mode) security profiles for docker
Designing to the Worst Case Scenario - Practical System Call Filtering with Seccomp - Simon Goda
2020 - seccomp — Your Next Layer of Defense
Securing Kubernetes Applications by Crafting Custom Seccomp Profiles - Sascha Grunert, Red Hat
Using seccomp to limit the Linux kernel attack service - Michael Kerrisk - NDC Security 2023
Enhancing Kubernetes with the Security Profiles Operator - Colleen Murphy & Sascha Grunert, Red Hat
Seccomp: What Can It Do For You? - Justin Cormack, Docker
Generating seccomp profiles for containers using podman and eBPF
Container Security, capabilities an seccomp profiles - Alberto Losada Grande & Mario Vázquez, RedHat
pwn.college - Sandboxing - Escaping seccomp
pwn.college - Sandboxing - seccomp
seccomp — Your Next Layer of Defense
TBS[21]: Seccomp Operator
Advanced Linux Privilege Escalation: Introduction to Seccomp
Introduction to the Kubernetes Seccomp Operator (RTFM with Rawkode)
Demo of seccomp in Docker 1.10
Improving Containers Isolation in Kubernetes - Cosmin Cojocar, Adobe