YoVDO

Beyond Signatures - Using TUF and Notary to Secure Software Distribution

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Conference Talks Courses Threat Identification Courses Notary Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of secure software distribution in this conference talk. Delve into The Update Framework (TUF) and its application in protecting against attacks on software distribution and updates. Discover how TUF can enhance security for registries and learn about its adaptation for use with the Notary v2 project. Examine the threat model, cryptographic signatures, and their limitations. Gain insights into TUF attacks, principles, and features such as explicit and implicit relocation and offline keys. Understand the importance of securing the system and explore new features in this comprehensive overview of TUF and Notary for software distribution security.

Syllabus

Intro
Why do we care
What are we doing
Threat model
Cryptographic signatures
The downside of cryptographic signatures
Summary of attacks
TUF attacks
TUF principles
Explicit and implicit relocation
Offline keys
Securing the system
New features
Learn more


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Server Hardening Fundamentals
A Cloud Guru
Activos, amenazas y vulnerabilidades
Google via Coursera
AWS Network Firewall for Ingress/Egress Traffic (Korean)
Amazon Web Services via AWS Skill Builder
AWS Security Best Practices: Overview
Amazon Web Services via AWS Skill Builder
AWS Security Best Practices: Overview (Indonesian)
Amazon Web Services via AWS Skill Builder