YoVDO

Securing the Perimeter - CFCR/CFAR Chain of Custody With CI/CD Pipelines

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Conference Talks Courses CI/CD Pipelines Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on securing CI/CD pipelines and establishing a chain of custody in Kubernetes environments. Dive into the critical aspects of ensuring end-to-end security in software delivery processes, including transmission security, developer key rotation, signed git commits, and independently reproducible build verification. Learn about implementing signed release artifacts and runtime authority for immutable containers to achieve a secure chain of custody from development to production. Gain valuable insights into protecting your entire software delivery process against potential compromises, even with Kubernetes' secure-by-default posture.

Syllabus

Securing the Perimeter - CFCR/CFAR Chain of Custody With CI/CD Pipelines - Keith Strini, Pivo


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube