YoVDO

Threat Modeling for Linux Containers LXC, Docker and the Cloud

Offered By: LASCON via YouTube

Tags

LASCON Courses Docker Courses OpenStack Courses System Security Courses Threat Modeling Courses Linux Containers Courses

Course Description

Overview

Explore threat modeling methodologies for complex cloud technologies in this LASCON conference talk. Discover the limitations of traditional data flow diagrams when applied to interconnected systems like OpenStack, Linux Containers, and Docker. Learn from three years of threat modeling experience at Rackspace as the speaker shares valuable insights and demonstrates effective techniques for modeling multi-system OpenStack deployments. Gain practical knowledge on creating useful threat models for developers, operations teams, and security professionals. Delve into topics such as inherited risk, lifecycle documentation, and risk assessment in

Syllabus

Introduction
The Core of this Talk
What is Threat Mama
What is Threat Model
Elite Bubbles
Example
Inherited Risk
The Cloud
Lifecycle Documentation
Website
Risk Assessment


Taught by

LASCON

Related Courses

Управление вычислениями
Bioinformatics Institute via Stepik
Monitoring Containerized Application Health with Docker
Pluralsight
CentOS Enterprise Linux 7 Virtualization Management
Pluralsight
Getting Started with Docker on Windows
Pluralsight
Scenario Based LXD/LXC Security
A Cloud Guru