Главная
Study mode:
on
1
Intro
2
Why Security
3
Data protection
4
Cloudnative
5
Pivotal
6
Poll Results
7
Trustworthy Infrastructure
8
Data Analysis
9
Meltdown
10
Shared Responsibility
11
Configuration Options
12
Cloud Firewalls
13
Vulnerable Software
14
Passwords
15
Containers
16
Supply chain issues
17
Leaked credentials
18
Functions
19
Environment Variables
20
Cloud Leak
21
Login Secrets
22
Time
23
Tools
24
dependable
25
summary
Description:
Explore cloud-native security strategies in this 52-minute conference talk. Delve into the unique security challenges of cloud-native applications, comparing them to traditional approaches. Learn how to prioritize security efforts, avoid common vulnerabilities, and implement best practices for both Linux and Windows environments. Discover techniques for data protection, infrastructure security, and handling sensitive information like passwords and credentials. Examine the impact of containers, functions, and environment variables on security. Gain insights into cloud firewalls, supply chain issues, and tools for maintaining a secure cloud-native ecosystem. Leave with a comprehensive understanding of how to enhance security in cloud-native deployments and confidently navigate the shared responsibility model of cloud security.

Security in Cloud-Native

NDC Conferences
Add to list