Top 10 Istio Security Risks and Mitigation Strategies
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the top 10 Istio security risks and their mitigation strategies in this 34-minute conference talk by José Carlos Chávez from Tetrate. Gain insights into CNCF's first-ever community-driven list of security risks for Istio deployments, developed by security professionals and cloud native computing experts. Learn how to prioritize security efforts and protect against malicious attacks, data breaches, and other security incidents in cloud native applications. Discover the selection criteria for the list and understand critical topics such as misconfigurations, insecure communication, unsafe authorization patterns, supply chain vulnerabilities, traffic capture limitations, and monitoring failures. Equip yourself with valuable knowledge to enhance the security of your Istio deployments and cloud native computing environments.
Syllabus
Introduction
What is a security risk
Why do I care about security
Security in a Service Mesh
Threat Actors
Misconfiguration
Insecure Communication
Unsafe Authorization Patterns
Weak Service Account Authorization
Broken Object Level Authorization
Supply Chain Vulnerabilities
Ingress Traffic Capture Limitations
Egress Traffic Capture Limitations
Monitoring Failures
What is your security risk
Conclusion
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Менеджмент информационной безопасностиHigher School of Economics via Coursera Planning a Security Incident Response
Microsoft via edX Identifying Security Vulnerabilities
University of California, Davis via Coursera Secure Coding Practices
University of California, Davis via Coursera Atlas Security
MongoDB University