Securing the Perimeter - CFCR/CFAR Chain of Custody With CI/CD Pipelines
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore a comprehensive conference talk on securing CI/CD pipelines and establishing a chain of custody in Kubernetes environments. Dive into the critical aspects of ensuring end-to-end security in software delivery processes, including transmission security, developer key rotation, signed git commits, and independently reproducible build verification. Learn about implementing signed release artifacts and runtime authority for immutable containers to achieve a secure chain of custody from development to production. Gain valuable insights into protecting your entire software delivery process against potential compromises, even with Kubernetes' secure-by-default posture.
Syllabus
Securing the Perimeter - CFCR/CFAR Chain of Custody With CI/CD Pipelines - Keith Strini, Pivo
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube