Ensuring Kubernetes Security Through DISA STIG Process - Corsec Security and Mirantis
Offered By: Mirantis via YouTube
Course Description
Overview
Syllabus
- Intro
- Corsec's role in the MKE DISA STIG
- How does Corsec stay up-to-date with the latest DISA STIG?
- How does alignment work re: DISA STIG?
- How does Corsec handle security testing?
- How Corsec secures different software
- STIG vs FEDRAMP vs ISO-27001
- How does Corsec handle updates?
- Corsec's advice to prepare for STIG certification
- Corsec Security's partnership with the DISA
- Importance of documentaion in STIG process
- Real world example: challenges with STIG certification
- Importance of achieving DISA STIG for MKE
- Key security features for the MKE DISA STIG
- Miranits' role in MKE STIG certification process
- What does support look like for MKE DISA STIG?
- Timelines for MKE DISA STIG process
- How does the MKE DISA STIG handle new vulnerabilities?
- What Mirantis learned about the DISA STIG process
- Outro
Taught by
Mirantis
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network