YoVDO

Protecting Sensitive Code with Encrypted Container Images on Kubernetes

Offered By: Linux Foundation via YouTube

Tags

Kubernetes Courses DevSecOps Courses Symmetric Encryption Courses Asymmetric Encryption Courses Enterprise Security Courses Container Security Courses Container Registry Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the process of protecting sensitive code using encrypted container images on Kubernetes in this 32-minute conference talk by Brandon Lum and Harshal Patil from IBM. Learn about the importance of safeguarding critical algorithms, proprietary code, and highly sensitive content from unencrypted exposure. Discover the end-to-end process of creating encrypted containers during the build process and running them on a Kubernetes cluster using ImageDecryptSecrets. Examine how the Encrypted Images OCI spec enables fine-grained encryption through container image layering. Gain insights into the integration of Image Encryption within the container ecosystem and explore potential innovations in the container DevSecOps pipeline. Delve into topics such as symmetric and asymmetric encryption, OCI spec changes, and encryption on layers. Acquire valuable knowledge on protecting trade secrets and proprietary information in enterprise environments.

Syllabus

Intro
Registry
Scenario
Demo
Thank you
Deep Dive
Symmetric Encryption
Asymmetric Encryption
What we do
The symmetric key
The private key
OCI spec changes
Encryption on layers
Wrap up
Resources needed


Taught by

Linux Foundation

Tags

Related Courses

Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Scalable Microservices with Kubernetes
Google via Udacity
Google Cloud Fundamentals: Core Infrastructure
Google via Coursera
Introduction to Kubernetes
Linux Foundation via edX
Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX