4 CI Security Best Practices to Prevent Cloud-Native Supply Chain Attacks
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the security challenges of extensible CI pipelines and learn how to prevent cloud-native supply chain attacks in this 42-minute webinar. Discover how simple CI workflow misconfigurations can create vulnerabilities in your supply chain. Examine potential exploits for platforms like GitHub Actions, GitLab Runner, and CircleCI, and gain valuable tips for securing your CI environment. Learn four essential CI security best practices to strengthen your cloud-native supply chain and protect against potential attacks. This Linux Foundation-sponsored webinar, presented by Bridgecrew by Prisma Cloud, offers crucial insights for developers and DevOps teams working with CI/CD pipelines in cloud-native environments.
Syllabus
LF Live Webinar: 4 CI Security Best Practices to Prevent Cloud-Native Supply Chain Attacks
Taught by
Linux Foundation
Tags
Related Courses
Set up a Continuous Integration (CI) workflow in CIrcleCICoursera Project Network via Coursera Continuous Integration: Tools
LinkedIn Learning Getting Started with CircleCI
Pluralsight Terraform Tutorial
YouTube Angular: Workflows
LinkedIn Learning