YoVDO

The Runtime Rodeo - Taming Open Source Image Behavior

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cloud-Native Security Courses Container Security Courses Software Composition Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking approach to cloud native security in this 33-minute conference talk by Jimmy Mesta from RAD Security. Delve into a proposed standard for creating behavioral fingerprints of open source image runtime behavior. Examine how this innovative method could revolutionize software supply chain verification, potentially preventing attacks like the infamous SolarWinds incident. Learn about the decision-making process behind the new standard, including what should be included or excluded from the fingerprint, using popular open source images like nginx and apache as examples. Gain insights into how this approach complements existing security measures such as SBOMs, SCA, and image signing, offering a more comprehensive solution for runtime security in cloud native environments.

Syllabus

The Runtime Rodeo; Where Open Source Image Behavior Is Tamed - Jimmy Mesta, RAD Security


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

AZ-500: Microsoft Azure Security Technologies (LA)
A Cloud Guru
Kubernetes Security
A Cloud Guru
Scenario Based Docker Security
A Cloud Guru
Scenario Based LXD/LXC Security
A Cloud Guru
Secure Container Host Operating System
A Cloud Guru