YoVDO

The Runtime Rodeo - Taming Open Source Image Behavior

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cloud-Native Security Courses Container Security Courses Software Composition Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking approach to cloud native security in this 33-minute conference talk by Jimmy Mesta from RAD Security. Delve into a proposed standard for creating behavioral fingerprints of open source image runtime behavior. Examine how this innovative method could revolutionize software supply chain verification, potentially preventing attacks like the infamous SolarWinds incident. Learn about the decision-making process behind the new standard, including what should be included or excluded from the fingerprint, using popular open source images like nginx and apache as examples. Gain insights into how this approach complements existing security measures such as SBOMs, SCA, and image signing, offering a more comprehensive solution for runtime security in cloud native environments.

Syllabus

The Runtime Rodeo; Where Open Source Image Behavior Is Tamed - Jimmy Mesta, RAD Security


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Maintaining Deployment Security in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning
Securing Containers and Kubernetes Ecosystem
LinkedIn Learning
Performing DevSecOps Automated Security Testing
Pluralsight