- The importance of a validated cryptographic module
4
- Encryption via validated cryptographic module
5
- DevSecOps approach explained
6
- Quick recap
7
- Outro
Description:
Discover how to secure business-critical applications using Mirantis Container Runtime in this informative 33-minute webinar. Learn about the importance of a validated cryptographic module for end-to-end encryption and secure mutual TLS authentication. Explore the integration of container runtime with CI/CD pipelines for signed image promotion and vulnerability scanning in conjunction with Mirantis Secure Registry. Gain insights into building a secure software supply chain for both Linux and Windows environments, essential for protecting data in mission-critical settings. Follow along as the presenter explains the DevSecOps approach and provides a comprehensive overview of Mirantis Container Runtime's enterprise features, concluding with a quick recap of key points covered.
How to Use Mirantis Container Runtime to Secure Business-Critical Applications