Главная
Study mode:
on
1
Intro
2
Agenda
3
Physical Layout 1/2
4
Background Knowledge
5
Certificates
6
Architecture 12/21
7
Short recap STRIDE
8
ACI Filter Mechanism Bypass
9
VTEP Spoofing
10
Switch Compromise
11
Some Challenge Response Functionality
12
Device Packages
13
OpFlex Control Protocol
14
Next Steps
Description:
Explore advanced threat modeling techniques and security considerations for Cisco Application Centric Infrastructure (ACI) in this comprehensive conference talk. Delve into the physical layout, essential background knowledge, and architectural components of ACI. Learn about critical security aspects, including the ACI filter mechanism bypass, VTEP spoofing, and switch compromise. Examine challenge-response functionality, device packages, and the OpFlex control protocol. Gain valuable insights into potential vulnerabilities and discover effective strategies to enhance the security posture of your ACI environment. Conclude with a discussion on next steps for implementing robust threat modeling practices in Cisco ACI deployments.

Threat Modelling and Beyond for Cisco ACI

WEareTROOPERS
Add to list
0:00 / 0:00