Running at Light Speed - Cloud Native Security Patterns
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
OWASP Cloud Native Characteristics
OWASP Cloud Native Secure Architecture ✓ Container Isolation Control Plane Hardening Network Segmentation Encrypted Communications
OWASP Who's Job is it Anyway?
OWASP Isolating Containerized Workloads
OWASP Reconciler Pattern
OWASP Spoiler: Containers Aren't Sandboxes
OWASP The Gateway Drug
OWASP Control Groups & Namespaces
OWASP Build Integrity & Attestation
OWASP User Namespaces
OWASP Rootless Containers
OWASP Authentication
OWASP Fixing the Problem
OWASP Authorization
OWASP Create Roles & Bindings
OWASP Controller Pattern
OWASP Admission Controllers
OWASP Designing a PodSecurity Policy
OWASP Sidecar Pattern Decomposition pattern
OWASP Secrets Management
OWASP Dynamic Secrets
OWASP Example - Retrieve & Mount a Secret
Taught by
OWASP Foundation
Related Courses
Building on Microsoft Sentinel PlatformMicrosoft via YouTube Securing Applications and Infrastructure on Kubernetes with Sysdig
Mirantis via YouTube Container Escape in 2021
Hack In The Box Security Conference via YouTube Running at Light Speed - Cloud Native Security Patterns
LASCON via YouTube Controlled Mayhem With Cloud Native Security Pipelines
OWASP Foundation via YouTube