Beyond Signatures - Using TUF and Notary to Secure Software Distribution
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the critical aspects of secure software distribution in this conference talk. Delve into The Update Framework (TUF) and its application in protecting against attacks on software distribution and updates. Discover how TUF can enhance security for registries and learn about its adaptation for use with the Notary v2 project. Examine the threat model, cryptographic signatures, and their limitations. Gain insights into TUF attacks, principles, and features such as explicit and implicit relocation and offline keys. Understand the importance of securing the system and explore new features in this comprehensive overview of TUF and Notary for software distribution security.
Syllabus
Intro
Why do we care
What are we doing
Threat model
Cryptographic signatures
The downside of cryptographic signatures
Summary of attacks
TUF attacks
TUF principles
Explicit and implicit relocation
Offline keys
Securing the system
New features
Learn more
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Securing the Container Supply Chain with Notary, TUF, and GatekeeperLinux Foundation via YouTube Using Docker Content Trust with Kubernetes Admission Controllers to Secure Runtime
Docker via YouTube Security Update: LinuxKit, Security Scanning, and Notary - Moby Summit
Docker via YouTube Securing the Software Supply Chain with TUF and Docker - Protecting Against Distribution Attacks
Docker via YouTube Improve Vulnerability Management with OCI Artifacts - It Is That Easy
CNCF [Cloud Native Computing Foundation] via YouTube