YoVDO

Top 10 Istio Security Risks and Mitigation Strategies

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Istio Courses Kubernetes Courses Microservices Courses Supply Chain Security Courses Threat Modeling Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the top 10 Istio security risks and their mitigation strategies in this 34-minute conference talk by José Carlos Chávez from Tetrate. Gain insights into CNCF's first-ever community-driven list of security risks for Istio deployments, developed by security professionals and cloud native computing experts. Learn how to prioritize security efforts and protect against malicious attacks, data breaches, and other security incidents in cloud native applications. Discover the selection criteria for the list and understand critical topics such as misconfigurations, insecure communication, unsafe authorization patterns, supply chain vulnerabilities, traffic capture limitations, and monitoring failures. Equip yourself with valuable knowledge to enhance the security of your Istio deployments and cloud native computing environments.

Syllabus

Introduction
What is a security risk
Why do I care about security
Security in a Service Mesh
Threat Actors
Misconfiguration
Insecure Communication
Unsafe Authorization Patterns
Weak Service Account Authorization
Broken Object Level Authorization
Supply Chain Vulnerabilities
Ingress Traffic Capture Limitations
Egress Traffic Capture Limitations
Monitoring Failures
What is your security risk
Conclusion


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Менеджмент информационной безопасности
Higher School of Economics via Coursera
Planning a Security Incident Response
Microsoft via edX
Identifying Security Vulnerabilities
University of California, Davis via Coursera
Secure Coding Practices
University of California, Davis via Coursera
Atlas Security
MongoDB University