Главная
Study mode:
on
1
Introduction
2
Attack modeling
3
Outline
4
Containerization
5
Cloud adoption
6
Containerization landscape
7
Proliferation significance
8
Threat agent
9
Attack actors
10
Use cases
11
Opensource security testing
12
Attack patterns
13
Attack surface for containers
14
Animation
15
Personal Services
16
Application Decomposition
17
Threat Prognosis
18
Threat Rates
19
Weaknesses
20
Bash docker
21
Alternate attack path
22
Orchestration attack
23
The human element
Description:
Explore attack tree vignettes for Containers as a Service applications and risk-centric threat models in this 57-minute conference talk by Tony Uceda Vélez, CEO of VerSprite Security, at AppSec Ca 2016. Delve into containerization, cloud adoption, and the containerization landscape while examining threat agents, attack actors, and use cases. Learn about open-source security testing, attack patterns, and the attack surface for containers. Analyze personal services, application decomposition, threat prognosis, and threat rates. Investigate weaknesses in bash docker, alternate attack paths, orchestration attacks, and the human element. Gain valuable insights into securing containerized applications and understanding the associated risks in this comprehensive presentation from the OWASP Foundation.

Attack Tree Vignettes for Containers as a Service Applications - Risk-Centric Threat Modeling

OWASP Foundation
Add to list
0:00 / 0:00