Главная
Study mode:
on
1
Introduction
2
The Core of this Talk
3
What is Threat Mama
4
What is Threat Model
5
Elite Bubbles
6
Example
7
Inherited Risk
8
The Cloud
9
Lifecycle Documentation
10
Website
11
Risk Assessment
Description:
Explore threat modeling methodologies for complex cloud technologies in this LASCON conference talk. Discover the limitations of traditional data flow diagrams when applied to interconnected systems like OpenStack, Linux Containers, and Docker. Learn from three years of threat modeling experience at Rackspace as the speaker shares valuable insights and demonstrates effective techniques for modeling multi-system OpenStack deployments. Gain practical knowledge on creating useful threat models for developers, operations teams, and security professionals. Delve into topics such as inherited risk, lifecycle documentation, and risk assessment in

Threat Modeling for Linux Containers LXC, Docker and the Cloud

LASCON
Add to list