Главная
Study mode:
on
1
Software Supply Chain
2
Software Security
3
Supply Chain Security & Containers
4
Find a HELM chart
5
Levels of Typosquatting
6
Container Supply Chain
7
The importance of metadata
8
Distroless containers
9
Reproducibility
10
Securing Container Creation
Description:
Explore the critical aspects of software supply chain security in Infrastructure as Code (IaC) and learn effective strategies to mitigate risks. Delve into the KICS (Keep Infrastructure as Code Secure) open-source project and its role in enhancing IaC security. Examine the parallels between IaC vulnerabilities and software package dependencies, highlighting the importance of scrutinizing reused Docker files, HELM charts, and container sources. Gain insights into emerging risks in the IaC world and their potential impact on lower levels of the software stack. Discover how to leverage IaC scanning techniques to prevent software supply chain issues in your infrastructure. Cover key topics including software security, container supply chain, typosquatting, metadata importance, distroless containers, reproducibility, and secure container creation practices.

Software Supply Chain Aspects in Infrastructure as Code and How to Secure It

Linux Foundation
Add to list