YoVDO

Why Checking Infrastructure-as-Code for Misconfigurations Is Not Enough - Comprehensive Cloud-Native Application Security

Offered By: OWASP Foundation via YouTube

Tags

Cloud Security Courses Compliance Courses Complex Systems Courses Application Architecture Courses Infrastructure as Code Courses Cloud-Native Applications Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the limitations of focusing solely on misconfiguration checks in cloud-native application security in this 48-minute OWASP Foundation talk by Aakash Shah, CTO of Oak9. Learn why a comprehensive approach to security design is crucial for cloud-native applications, going beyond simple configuration checks. Discover best practices for dynamically assessing application architecture security, leveraging infrastructure-as-code automation, and addressing emergent properties in complex systems. Gain insights into modern software development trends, the importance of security-by-design principles, and strategies for holistically evaluating security and compliance objectives in cloud environments.

Syllabus

Intro
Software & Infrastructure Delivery PAST
Modern Infrastructure Development
Cloud Native Applications Today
Trends in Modern Software Development
Complex Systems and Emergent Properties
Security is an emergent property
Types of Emergence
Limitations of Misconfiguration checking
Addressing Cloud-Native Security
Loadbalancer. Logging
Managed Inspection Points for Database Interactions


Taught by

OWASP Foundation

Related Courses

Introduction to Complexity
Santa Fe Institute via Complexity Explorer
Introduction to Dynamical Systems and Chaos
Santa Fe Institute via Complexity Explorer
Introduction to Agent-based Modeling
Santa Fe Institute via Complexity Explorer
Fractals and Scaling
Santa Fe Institute via Complexity Explorer
Zusammenhänge entdecken, Phänomene verstehen: Programmieren mit Etoys
openHPI