Essential-8 Security in Practice with Kubernetes
Offered By: linux.conf.au via YouTube
Course Description
Overview
Explore the implementation of Essential-8 security mitigation requirements in a Kubernetes-orchestrated cloud infrastructure for the Digital Earth Australia and Digital Earth Africa programs. Learn how to balance security needs with open access, open data, and open source principles while managing petabyte-scale data processing and cross-continent data movement. Discover the challenges of enabling scientific experimentation through arbitrary code execution and handling large-scale computational demands. Gain insights into infrastructure codification, application deployment, security scanning, network filtering, and automated GitOps deployments. Understand how to address security incidents, such as cryptocurrency mining, and implement mitigation strategies. Acquire knowledge on meeting government security practices while maintaining a flexible, on-demand computation environment for scientific users in this 44-minute conference talk from linux.conf.au 2021.
Syllabus
"Essential-8 Security in Practice with Kubernetes" - Tishampati Dhar (LCA 2021 Online)
Taught by
linux.conf.au
Related Courses
Container Image Security- What It Is and How to Remediate VulnerabilitiesMirantis via YouTube Open Source Security Scanner - Docker Image Analysis with Trivy
Linode via YouTube Hands-on Introduction to Trivy - Continuous Scanning for Container Security
Rawkode Academy via YouTube Improve Vulnerability Management with OCI Artifacts - It Is That Easy
CNCF [Cloud Native Computing Foundation] via YouTube GitOps - The Magic Key to Cloud Native Security
CNCF [Cloud Native Computing Foundation] via YouTube