YoVDO

Data Security and Storage Hardening in Rook and Ceph

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Data Security Courses Kubernetes Courses Encryption Courses Access Control Courses Key Management Courses Threat Modeling Courses Rook Courses Ceph Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore data security and storage hardening techniques in Rook and Ceph in this 18-minute conference talk from KubeCon + CloudNativeCon Europe 2022. Delve into the security model exposed by Rook with Ceph, the leading open-source software-defined storage platform. Examine various hardening options suitable for different threat profiles, including threat modeling, implementing separate security zones to limit attack blast radius, encryption at rest and in-flight using FIPS 140-2 validated ciphers, hardened builds and default configurations, user access controls, and key management. Learn about data retention, secure deletion, and the additional security benefits provided by containerization. Discover how Rook simplifies the application of hardening options through simple .yaml file modifications. Cover topics such as network security zones, encryption and key management, control plane security, identity and access management, auditing, and infrastructure hardening.

Syllabus

Intro
Rook in brief
Threat Model
Network Security zones
Connecting Security zones
Encryption and Key Management
Encryption in transit
Rook specific
Control Plane
Identity and access
Auditing
Data retention
Infrastructure hardening


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

A Beginner’s Guide to Docker
Packt via FutureLearn
A Beginner's Guide to Kubernetes for Container Orchestration
Packt via FutureLearn
A Practical Guide to Amazon EKS
A Cloud Guru
Advanced Networking with Kubernetes on AWS
A Cloud Guru
AIOps Essentials (Autoscaling Kubernetes with Prometheus Metrics)
A Cloud Guru