YoVDO

Introducing Graph Theory to Policy-As-Code

Offered By: OWASP Foundation via YouTube

Tags

Policy-as-Code Courses Cybersecurity Courses Terraform Courses Graph Theory Courses Access Control Courses Cloud Infrastructure Courses Infrastructure as Code Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the application of graph theory to Policy-As-Code in this insightful conference talk. Delve into the concept of modeling modern cloud infrastructures as graphs, where compute resources, network resources, and access control resources form interconnected nodes. Learn how Infrastructure as Code projects like Terraform utilize directed acyclic graphs to manage and modify infrastructure resources across various platforms. Discover the potential of applying similar graph-based approaches to analyze and enforce policies over infrastructure as code. Gain hands-on knowledge of the open-source tool Checkov, including its internal workings and practical usage. Write a custom policy focusing on the relationships between compute resources and access control resources, demonstrating the power of graph theory in Policy-As-Code implementations.

Syllabus

OWASP Standard Classification: Introducing graph theory to Policy-As-Code - Barak Schoster


Taught by

OWASP Foundation

Related Courses

Access Control Concepts
(ISC)² via Coursera
AZ-303 Part 2 - Implement Management and Security Solutions in Azure
A Cloud Guru
Google Cloud Identity and Access Management (IAM) Deep Dive
A Cloud Guru
Google Kubernetes Engine Deep Dive
A Cloud Guru
HashiCorp Vault
A Cloud Guru