Главная
Study mode:
on
1
Intro
2
INTRODUCTION
3
WHAT'S THE PROBLEM?
4
WHAT GOOD LOOKS LIKE
5
WHAT DOES GOOD LOOK LIKE
6
THE FIRST TURTLE
7
STRATEGIES
8
ORCHESTRATOR DECRYPTION
9
APPLICATION DECRYPTION
10
OPERATIONAL COMPARTMENTALIZATION
11
ORGANIZATIONAL COMPARTMENTALIZATION
12
SCM ENCRYPTION TOOLS
13
ORCHESTRATION ENCRYPTION TOOLS
14
THE SECOND TURTLE
15
SECRETS SERVICES
16
SECRETS AS A SERVICE
17
THE THIRD TURTLE
18
THE BIG PICTURE
19
IN CLOSING
Description:
Explore strategies for securely storing and managing secrets in cloud and data center environments through this 48-minute conference talk from AppSecUSA 2015. Delve into the challenges of credential storage, examining various tools, technologies, and approaches for improving secret management throughout development, testing, and deployment. Learn about orchestrator decryption, application decryption, operational and organizational compartmentalization, SCM encryption tools, and secrets-as-a-service solutions. Gain insights into the advantages and disadvantages of different options to help determine the most appropriate solutions for your applications and organizations, covering both data center and cloud-based deployments with a focus on open-source tools for common enterprise platforms.

Storing Secrets in the Cloud and Data Center: Strategies and Tools

OWASP Foundation
Add to list
0:00 / 0:00