Your mission is to secure the vast tracts of land of the cloud native security landscape. Where do you even start?!? It would be preposterous to cover that whole topic in a single session, but we can at least map it out. Our plan is to break it down into three key areas and review each in turn.
Platform: securing and upgrading our control planes and nodes; isolating compute, storage, and network resources; managing privileges and secrets
User management and permissions: various ways to authenticate and authorize user access; leveraging tools like RBAC and Namespaces, and some common “gotchas”
Software supply chain: what that means; some actual threat models are; how to mitigate them
You’ll leave this session with a stronger understanding of the breadth and depth of cloud native security and resources to further develop your knowledge.
Watch video Cloud Native Security for the Rest of Us online, duration hours minute second in high quality that is uploaded to the channel SpringDeveloper 01 January 1970. Share the link to the video on social media so that your subscribers and friends will also watch this video. This video clip has been viewed 1,263 times and liked it 44 visitors.