4 CI Security Best Practices to Prevent Cloud-Native Supply Chain Attacks
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the security challenges of extensible CI pipelines and learn how to prevent cloud-native supply chain attacks in this 42-minute webinar. Discover how simple CI workflow misconfigurations can create vulnerabilities in your supply chain. Examine potential exploits for platforms like GitHub Actions, GitLab Runner, and CircleCI, and gain valuable tips for securing your CI environment. Learn four essential CI security best practices to strengthen your cloud-native supply chain and protect against potential attacks. This Linux Foundation-sponsored webinar, presented by Bridgecrew by Prisma Cloud, offers crucial insights for developers and DevOps teams working with CI/CD pipelines in cloud-native environments.
Syllabus
LF Live Webinar: 4 CI Security Best Practices to Prevent Cloud-Native Supply Chain Attacks
Taught by
Linux Foundation
Tags
Related Courses
Building on Microsoft Sentinel PlatformMicrosoft via YouTube Securing Applications and Infrastructure on Kubernetes with Sysdig
Mirantis via YouTube Container Escape in 2021
Hack In The Box Security Conference via YouTube Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube Controlled Mayhem With Cloud Native Security Pipelines
OWASP Foundation via YouTube