Главная
Study mode:
on
1
Introduction
2
Open Source Challenges
3
Why Open Source
4
Vulnerability Databases
5
Open Source Licenses
6
Early Detection
7
Software Composition Analysis
8
Context
9
Culture
10
Safety Security
11
Checkouts Gun
12
Log4J Example
13
Sources of Vulnerabilities
14
Checkoff
15
Summary
Description:
Explore the interconnected risks of vulnerabilities and misconfigurations in cloud-native environments during this 46-minute Linux Foundation webinar. Delve into the evolving attack surface created by DevOps and cloud-native technologies, examining how open-source packages, infrastructure as code, container images, and delivery pipelines form complex interdependencies. Learn about software supply chain attacks that leverage infrastructure misconfigurations and known vulnerabilities, using the Log4j flaw as a case study. Gain insights into the necessity of a proactive, defense-in-depth approach to cloud-native security and discover strategies for comprehensive protection across entire cloud-native application stacks, from code to cloud and application to infrastructure. Topics covered include open source challenges, vulnerability databases, software composition analysis, sources of vulnerabilities, and practical examples to illustrate key concepts.

Vulnerabilities and Misconfigurations in Cloud-Native Security - Two Sides of the Same Risk Coin

Linux Foundation
Add to list