YoVDO

Security Hardening for Containerized Deployments Across Multi Clouds - With Mirantis & Entrust

Offered By: Mirantis via YouTube

Tags

DevOps Courses Cryptography Courses Kubernetes Courses Application Development Courses Regulatory Compliance Courses Container Security Courses

Course Description

Overview

Explore security hardening techniques for containerized deployments across multi-cloud environments in this 35-minute webinar. Learn about incorporating robust cryptography into containerized applications processing sensitive data, using hardware security modules (HSMs) to enhance security and facilitate compliance. Discover why high-assurance security is crucial for containerized applications, how to improve security in containerized environments, and typical use cases demonstrating the value of enhanced security. The webinar covers container and Kubernetes background, modern DevOps practices, security challenges in architecture and DevOps, and how Entrust and Mirantis partner to address container security. Gain insights into HSMs, container image security, and the role of Mirantis Kubernetes Engine. Conclude with key takeaways and a live Q&A session addressing container advantages, emerging security challenges, and HSM compliance facilitation.

Syllabus

- Introductions & agenda
- Background on containers & Kubernetes
- Modern application development - AKA, DevOps
- Security challenges: architecture & DevOps
- Architectural security challenges with containers & K8s
- DevOps challenges with containers & K8s
- How Entrust & Mirantis are partnering to help with container security
- Deep dive: how Entrust secures your containers
- What is a hardware security module HSM?
- A quick look at the entire infrastructure pipeline
- Container image security
- Where Mirantis Kubernetes Engine fits into all of this
- Key takeaways
- Live Q&A: what are the main advantages of containers over VMs?
- Live Q&A: do you expect new security challenges as more container orchestration tool arise?
- Live: Q&A: can you explain how HSMs facilitate compliance?
- Wrapping up


Taught by

Mirantis

Related Courses

Designing and Executing Information Security Strategies
University of Washington via Coursera
M&A: Concepts and Theories
New York Institute of Finance via edX
Medical Technology and Evaluation
University of Minnesota via Coursera
Healthcare Marketplace Capstone
University of Minnesota via Coursera
Stress Testing and Risk Regulation – Part 2
New York Institute of Finance via edX