Desktop to Deployment: Kubernetes Security with Checkov
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore Kubernetes security from desktop to deployment in this 50-minute CNCF conference talk. Learn about the OS Top 10, understand common security challenges, and discover effective solutions. Dive into CI monitoring, get introduced to Checkov for security scanning, and explore its customization options. Understand the concept of shifting left in security practices and learn about admission controllers in Kubernetes. Gain insights into K8s setup, precommit hooks, and command-line tools. Examine the importance of empathy in security implementations and base deployments. Conclude with a Q&A session to address any remaining questions on K8s security best practices.
Syllabus
Introduction
Welcome
Agenda
OS Top 10
The Problem
The Solution
Cake Example
Recap
Desktop to Deployment
CI Monitoring
Introducing Checkov
Checkov Customization
Shift Left
Admission Controller
K8s Setup
Whats Hatch 4
Precommit
Command Line
Pros
Base Deployment
Empathy
Conclusion
Questions
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
DevOps CI/CD Pipeline: Automation from development to deploymentUniversidad Anáhuac via edX DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Pluralsight Integrating Incident Response into DevSecOps
Pluralsight DevSecOps: Building a Secure Continuous Delivery Pipeline
LinkedIn Learning