Главная
Study mode:
on
1
Intro
2
Container threats
3
Mitigations
4
Dr Security
5
Container Pipeline
6
Access Control Authentication
7
Content Trust
8
Docker Infrastructure
9
Host hardening
10
Container hardening
11
Group access
12
Dark Bench for Security
13
Vulnerability Management
14
Network Monitoring
15
Logs
16
Application logs
17
Disk activity monitoring
18
Disk forensics
19
Super timelines
20
Memory forensics
21
Memory forensics tools
22
What is memory forensics
23
components
24
process integrity
25
summary
26
thank you
27
Questions
28
Networking
29
Monitoring
30
Firewall
31
Container Security
Description:
Explore a comprehensive presentation on securing Docker container pipelines at Salesforce, focusing on customer trust and security. Learn about the challenges of containerization in high-sensitivity data environments and discover the infrastructure built to address these issues. Dive into topics such as securing the container pipeline, building security into architecture, monitoring, Docker forensics (disk, memory, network), and automation. Gain insights into live memory analysis capabilities used to ensure container and application integrity during execution. Cover various aspects of container security, including threat mitigation, access control, authentication, content trust, host and container hardening, vulnerability management, network monitoring, logging, disk activity monitoring, and forensics techniques. Understand the importance of process integrity and network security in containerized environments.

Securing the Container Pipeline at Salesforce - Docker Use Case

Docker
Add to list
0:00 / 0:00