YoVDO

Operating Tekton with Secure Defaults

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Tekton Courses DevOps Courses Continuous Integration Courses Supply Chain Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore approaches to operating Tekton Pipelines securely in this 16-minute conference talk by Christie Warwick and Wendy Dembowski from Google. Learn how to implement strong security measures without overwhelming development teams, and discover techniques to prevent innocent infractions from escalating into major security incidents. Gain insights into utilizing the Tekton Catalog, Trusted Tasks, and remote resource resolution to empower developers in creating secure, robust, and reusable Pipelines and Tasks. Witness demonstrations showcasing how to establish a well-defined path for developers to enhance the security of their supply chain while maintaining Tekton's flexibility.

Syllabus

Operating Tekton with Secure Defaults - Christie Warwick & Wendy Dembowski, Google


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Startup Engineering
Stanford University via Coursera
Developing Scalable Apps in Java
Google via Udacity
Cloud Computing Concepts, Part 1
University of Illinois at Urbana-Champaign via Coursera
Cloud Networking
University of Illinois at Urbana-Champaign via Coursera
Cloud Computing Concepts: Part 2
University of Illinois at Urbana-Champaign via Coursera