YoVDO

Securing Cloud Applications and Their Credentials

Offered By: Strange Loop Conference via YouTube

Tags

Strange Loop Conference Courses Cloud Security Courses Containerization Courses Container Security Courses

Course Description

Overview

Explore cloud application security and credential management in this 40-minute conference talk from Strange Loop. Dive into the challenges of securing containerized cloud-based infrastructure as Srdjan Grubor, an R&D software engineer at CyberArk, shares insights on common container security problems and strategies to enhance application security at both container and scheduler levels. Learn about the impact of implementation misconfigurations on attack surfaces, discover next-generation security tools, and gain perspective on long-term security initiatives in cloud environments. Understand the balance between development velocity and security measures, and explore techniques for managing credentials and securing containers effectively. Benefit from Grubor's expertise in Docker, Linux systems, and cloud-based security as he guides you through the complexities of modern app security and the importance of not relying solely on developers for security implementation.

Syllabus

Introduction
Why should we care
Containerization
Security
There is no perfect system
What do you want vs what do you need
Layers
Containers
Additional security features
Container security
Common problems
Modern apps
Exfiltration potential
Dont trust developers
Developers vs security
Credentials
Securing containers
Managing credentials
Secret Lists
Conclusion


Taught by

Strange Loop Conference

Tags

Related Courses

Maintaining Deployment Security in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning
Securing Containers and Kubernetes Ecosystem
LinkedIn Learning
Performing DevSecOps Automated Security Testing
Pluralsight