How Hackers Can Breach CI/CD Systems - Security Vulnerabilities and Mitigation
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
CONTINUOUS DELIVERY CONTINUOUS DEPLOYMENT
The IDE Leaks!
The BAD ROLE Granularity!
The DEV Machine as only source code se
All Libraries Allowed!
SECRETS & LEAKS
Control Artefacts Repository
The ENVIRONMENT Leak! (1/2)
The ENV Leak! (2/2)
A reverse Shell in the Pipeline
The Evil GitHub Actions!
The mighty CI BOT
The EVIL AGENT (1/3)
The EVIL AGENT (3/3)
The DOCKER HUB Leak!
Keep API Safe!
The SOURCE CODE ransomware!
The Fat DOCKER!
The evil DOCKER twin!
The Greedy Service consumer!
Run FREE Internet!
The Trojan Jar!
The ZIP BOMB (2/4)
The ZIP BOMB (4/4)
Memory BOMB (3/5)
Memory BOMB (5/5)
Fork BOMB! (1/2)
Is your API Honest!? (1/2)
Keep SECRETS safe!
The Evil Alias!
The Shared infra! (1/2)
The TIP Of the iceberg
Taught by
OWASP Foundation
Related Courses
1C:Enterprise Junior Developer CourseMoscow Institute of Physics and Technology via Coursera A Beginner’s Guide to Docker
Packt via FutureLearn A Beginner’s Guide to Scrum Project Management
Packt via FutureLearn Google Professional Cloud DevOps Engineer Certification Path Introduction (GCP DevOps Engineer Track Part 1)
A Cloud Guru Introduction to Amazon CodeGuru
A Cloud Guru