YoVDO

Introducing Graph Theory to Policy-As-Code

Offered By: OWASP Foundation via YouTube

Tags

Policy-as-Code Courses Cybersecurity Courses Terraform Courses Graph Theory Courses Access Control Courses Cloud Infrastructure Courses Infrastructure as Code Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the application of graph theory to Policy-As-Code in this insightful conference talk. Delve into the concept of modeling modern cloud infrastructures as graphs, where compute resources, network resources, and access control resources form interconnected nodes. Learn how Infrastructure as Code projects like Terraform utilize directed acyclic graphs to manage and modify infrastructure resources across various platforms. Discover the potential of applying similar graph-based approaches to analyze and enforce policies over infrastructure as code. Gain hands-on knowledge of the open-source tool Checkov, including its internal workings and practical usage. Write a custom policy focusing on the relationships between compute resources and access control resources, demonstrating the power of graph theory in Policy-As-Code implementations.

Syllabus

OWASP Standard Classification: Introducing graph theory to Policy-As-Code - Barak Schoster


Taught by

OWASP Foundation

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network