YoVDO

Securing Cloud Applications and Their Credentials

Offered By: Strange Loop Conference via YouTube

Tags

Strange Loop Conference Courses Cloud Security Courses Containerization Courses Container Security Courses

Course Description

Overview

Explore cloud application security and credential management in this 40-minute conference talk from Strange Loop. Dive into the challenges of securing containerized cloud-based infrastructure as Srdjan Grubor, an R&D software engineer at CyberArk, shares insights on common container security problems and strategies to enhance application security at both container and scheduler levels. Learn about the impact of implementation misconfigurations on attack surfaces, discover next-generation security tools, and gain perspective on long-term security initiatives in cloud environments. Understand the balance between development velocity and security measures, and explore techniques for managing credentials and securing containers effectively. Benefit from Grubor's expertise in Docker, Linux systems, and cloud-based security as he guides you through the complexities of modern app security and the importance of not relying solely on developers for security implementation.

Syllabus

Introduction
Why should we care
Containerization
Security
There is no perfect system
What do you want vs what do you need
Layers
Containers
Additional security features
Container security
Common problems
Modern apps
Exfiltration potential
Dont trust developers
Developers vs security
Credentials
Securing containers
Managing credentials
Secret Lists
Conclusion


Taught by

Strange Loop Conference

Tags

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera