Главная
Study mode:
on
1
Introduction
2
About Theodoor
3
Explanation
4
Software Defined Infrastructure
5
SPI Architecture
6
Advantages of SPI
7
SPI as an attack factor
8
Insufficiently protected interfaces
9
Insecure handling of secrets
10
Encrypt Configuration Values
11
Logging Configuration Changes
12
Credentials
13
Untrusted Code
14
Security Lifecycle
15
Examples
Description:
Explore the security challenges and best practices for Software Defined Infrastructures (SDI) in this 26-minute conference talk from AppSec EU 2017. Delve into the advantages and potential vulnerabilities of configuration management tools like Puppet and Chef. Learn about the attack surface and threats in SDI deployments, and discover techniques for identifying vulnerabilities through source code analysis. Gain insights from real-world security reviews and understand how to remediate common security issues. Cover topics including insufficiently protected interfaces, insecure handling of secrets, encryption of configuration values, logging configuration changes, credential management, untrusted code, and implementing a robust security lifecycle. Benefit from practical examples and lessons learned to improve the security of your SDI implementations.

Improving the Security of Software Defined Infrastructures - AppSec EU 2017

OWASP Foundation
Add to list
0:00 / 0:00