Best Container Security Workflow for Your Organization
Offered By: Docker via YouTube
Course Description
Overview
Discover the optimal container security workflow for your organization in this 21-minute video from Docker. Learn how to shift security left in your software supply chain, addressing the challenges developers and DevSecOps face in securing code and production environments. Explore insights on integrating container security seamlessly into your team's workflow, transforming it from a dreaded task to a valuable asset. Gain knowledge about DevSecOps maturity, company security practices, container usage, and workflow envisioning. Examine autonomous and common base workflow examples, along with base image recommendations. Walk away with practical takeaways to enhance your container security approach and make it an integral part of your development process.
Syllabus
Intro
About this talk
Container security challenges
Define DevSecOps Maturity
How does your company operates Security and Development?
How does your company work with container?
How do you envision the container security workflow?
Autonomous Workflow Example
Common Base Workflow Example
Base image recommendations
Takeaways
Taught by
Docker
Related Courses
DevOps CI/CD Pipeline: Automation from development to deploymentUniversidad Anáhuac via edX DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Pluralsight Integrating Incident Response into DevSecOps
Pluralsight DevSecOps: Building a Secure Continuous Delivery Pipeline
LinkedIn Learning