YoVDO

Securing the Perimeter - CFCR/CFAR Chain of Custody With CI/CD Pipelines

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Conference Talks Courses CI/CD Pipelines Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on securing CI/CD pipelines and establishing a chain of custody in Kubernetes environments. Dive into the critical aspects of ensuring end-to-end security in software delivery processes, including transmission security, developer key rotation, signed git commits, and independently reproducible build verification. Learn about implementing signed release artifacts and runtime authority for immutable containers to achieve a secure chain of custody from development to production. Gain valuable insights into protecting your entire software delivery process against potential compromises, even with Kubernetes' secure-by-default posture.

Syllabus

Securing the Perimeter - CFCR/CFAR Chain of Custody With CI/CD Pipelines - Keith Strini, Pivo


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Cloud DevOps Engineer
Udacity
DevOps CI/CD Pipeline: Automation from development to deployment
Universidad Anáhuac via edX
DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX
Docker - SWARM - Hands-on - DevOps
Udemy
Docker and Kubernetes: The Complete Guide
Udemy