YoVDO

Securing the Software Supply Chain with TUF and Docker - Protecting Against Distribution Attacks

Offered By: Docker via YouTube

Tags

Software Security Courses Cryptography Courses Docker Courses Supply Chain Security Courses Key Management Courses Notary Courses The Update Framework Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of securing software distribution and updates in this 40-minute conference talk. Learn about The Update Framework (TUF) and its integration with Docker's Notary software to protect against various attack vectors. Discover how TUF addresses key revocation, mitigates man-in-the-middle attacks, and reduces the impact of repository compromise. Examine new techniques for verifying different stages of the software supply chain, including development, build, and quality assurance processes. Gain insights into the roles of various stakeholders, the concept of Darker Manifests, and the importance of standardization in enhancing software security.

Syllabus

Intro
What is an attack vector
Can we just apply crypto
Is it easy to provide security
Support dont judge
Roles
TUF
Is Docker vulnerable
Docker is secure
Darker Manifests
Whats Next
Attackers
Backdoors
Project Owner
Conclusion
standardization process
questions


Taught by

Docker

Related Courses

Toto-Ally TUF: Simple Tools for a Secure Software Supply Chain
Linux Foundation via YouTube
Software Supply Chain Security Case Study at Anaconda
Linux Foundation via YouTube
Securing the Container Supply Chain with Notary, TUF, and Gatekeeper
Linux Foundation via YouTube
Improving Package Repository Security - From White Papers to Practice
Linux Foundation via YouTube
Container Security: Supply Chain, Authorization, and Runtime Protection
Docker via YouTube