Главная
Study mode:
on
1
Intro
2
Containers: Expectations versus reality
3
Cybercrime is the most profitable type of crime
4
This is a major vulnerability
5
Apache struts 2 - the Equifax affair
6
Container technology 101
7
Container runtime security 101
8
Laying the (runtime) foundations
9
Privileges and Capabilities
10
Metadata - Adding Labels at build time
11
Metadata - Adding Labels at runtime
12
External registry with metadata support
13
Testing security in the build pipeline
14
Security Visibility: Basic (Java) Code Scanning
15
Dependency Scanning
16
Static Image Scanning
17
Delaying NFRs to the 'Last Responsible Moment'
Description:
Explore the critical aspects of deploying and operating with security in mind in this 48-minute Devoxx conference talk. Delve into the current threat landscape, focusing on container technology and Java applications, and learn effective strategies to mitigate risks. Gain insights into the impact of security throughout the software creation and delivery lifecycle, understand how container technology alters security requirements, and discover important open-source tools for code scanning and dependency verification. Learn when to implement these tools and follow guidelines for secure software development. Examine topics such as container runtime security, privileges and capabilities, metadata labeling, and security testing in build pipelines. Understand the importance of addressing non-functional requirements and the concept of delaying them to the 'Last Responsible Moment'.

Are You Deploying and Operating with Security in Mind?

Devoxx
Add to list
0:00 / 0:00