YoVDO

Data Security and Storage Hardening in Rook and Ceph

Offered By: DevConf via YouTube

Tags

Ceph Courses Encryption Courses Access Control Courses Data Security Courses Containerization Courses Threat Modeling Courses Software-Defined Storage Courses Rook Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security model of Rook with Ceph, the leading open-source software-defined storage platform, in this 35-minute conference talk from DevConf.US 2024. Delve into various hardening options for Ceph storage suitable for different threat profiles. Learn about defining threat models, limiting attack blast radius through separate security zones, implementing encryption at rest and in-flight, utilizing FIPS 140-2 validated ciphers, and applying hardened builds with default configurations. Discover user access controls, key management techniques, and approaches to data retention and secure deletion. Understand how containerization provides additional security benefits through lightweight domain separation. See how Rook simplifies the process of applying hardening options by modifying a .yaml file with the appropriate security context upon creation, making it easy to implement standard Ceph hardening options in container-based storage systems.

Syllabus

Data Security and Storage Hardening in Rook and Ceph - DevConf.US 2024


Taught by

DevConf

Related Courses

AWS Developer Tools Deep Dive
A Cloud Guru
Essential Container Concepts
A Cloud Guru
Google Cloud CI/CD Pipelines (GCP DevOps Engineer Track Part 3)
A Cloud Guru
Google Kubernetes Engine (GKE): Beginner to Pro
A Cloud Guru
LPI DevOps Tools Engineer Certification
A Cloud Guru