Running at Light Speed - Cloud Native Security Patterns
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
OWASP Cloud Native Characteristics
OWASP Cloud Native Secure Architecture ✓ Container Isolation Control Plane Hardening Network Segmentation Encrypted Communications
OWASP Who's Job is it Anyway?
OWASP Isolating Containerized Workloads
OWASP Reconciler Pattern
OWASP Spoiler: Containers Aren't Sandboxes
OWASP The Gateway Drug
OWASP Control Groups & Namespaces
OWASP Build Integrity & Attestation
OWASP User Namespaces
OWASP Rootless Containers
OWASP Authentication
OWASP Fixing the Problem
OWASP Authorization
OWASP Create Roles & Bindings
OWASP Controller Pattern
OWASP Admission Controllers
OWASP Designing a PodSecurity Policy
OWASP Sidecar Pattern Decomposition pattern
OWASP Secrets Management
OWASP Dynamic Secrets
OWASP Example - Retrieve & Mount a Secret
Taught by
OWASP Foundation
Related Courses
IoT Device Security: Executive BriefingPluralsight Defense Evasion with ProxyChains
Pluralsight Lateral Movement with Infection Monkey
Pluralsight Get Started with Network Security
Salesforce via Trailhead AWS Security Best Practices: Network Infrastructure
Amazon Web Services via AWS Skill Builder