YoVDO

Threat Modeling for Linux Containers LXC, Docker and the Cloud

Offered By: LASCON via YouTube

Tags

LASCON Courses Docker Courses OpenStack Courses System Security Courses Threat Modeling Courses Linux Containers Courses

Course Description

Overview

Explore threat modeling methodologies for complex cloud technologies in this LASCON conference talk. Discover the limitations of traditional data flow diagrams when applied to interconnected systems like OpenStack, Linux Containers, and Docker. Learn from three years of threat modeling experience at Rackspace as the speaker shares valuable insights and demonstrates effective techniques for modeling multi-system OpenStack deployments. Gain practical knowledge on creating useful threat models for developers, operations teams, and security professionals. Delve into topics such as inherited risk, lifecycle documentation, and risk assessment in

Syllabus

Introduction
The Core of this Talk
What is Threat Mama
What is Threat Model
Elite Bubbles
Example
Inherited Risk
The Cloud
Lifecycle Documentation
Website
Risk Assessment


Taught by

LASCON

Related Courses

Comparing WAF and RASP - Why?
LASCON via YouTube
API Security - Is it the New Application Attack Surface and How to Secure at Enterprise Scale
LASCON via YouTube
Privacy Impact Assessments - How Much Privacy Is Enough?
LASCON via YouTube
Your Frontier Defense - Understanding Web Application Firewalls
LASCON via YouTube
Doing This One Crazy Thing Will Change Your AppSec Program Forever
LASCON via YouTube