Enforceable Supply Chain Security Policy with OPA Gatekeeper and Ratify
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore how to establish trust for container images and enforce security policies in the software supply chain using OPA Gatekeeper and Ratify in this 36-minute conference talk. Learn about mitigating container supply chain threats through techniques such as image signing and verification, policy enforcement, SBOM generation, provenance attestation, and vulnerability scanning. Discover how Ratify, built as an external data provider for Gatekeeper, enables the enforcement of security policies by verifying image signatures, vulnerability reports, and SBOMs. Watch a demonstration on implementing admission control policies to ensure only compliant images are deployed, resulting in a more secure container supply chain. Gain insights into safeguarding your software ecosystem against rising threats and enhancing overall security posture.
Syllabus
Enforceable Supply Chain Security Policy with OPA Gatekeeper and Ratify - Feynman Zhou & Dahu Kuang
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Designing and Securing Multi-Tenant Runtime Environment at The New York TimesLinux Foundation via YouTube A Confidential Story of Well-Kept Secrets - Secure Secret Management in Kubernetes
CNCF [Cloud Native Computing Foundation] via YouTube Open Policy Agent (OPA) - Introduction and Latest Features
CNCF [Cloud Native Computing Foundation] via YouTube Kubernetes Security and Governance Made Easy Using Otomi
CNCF [Cloud Native Computing Foundation] via YouTube Managing Thousands of Clusters and Their Workloads with Flux
CNCF [Cloud Native Computing Foundation] via YouTube