Главная
Study mode:
on
1
intro
2
preamble
3
who is peleg
4
what we will cover
5
software bible
6
common types of misconfigurations
7
permission issues
8
unencrypted files and risks
9
challenges in monitoring changes
10
the automation gap
11
defence
12
introduction to configu
13
managing permissions effectively
14
ensuring data encryption
15
effective monitoring techniques
16
embracing automation
17
thank you for your attention
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore a 30-minute conference talk from Conf42 DevSecOps 2023 that delves into the critical issue of configurations as the weak link in the security chain. Learn about common types of misconfigurations, permission issues, and the risks associated with unencrypted files. Discover the challenges in monitoring changes and the automation gap in security practices. Gain insights into effective defense strategies, including an introduction to the Configu project for managing configurations. Understand how to manage permissions effectively, ensure data encryption, implement monitoring techniques, and embrace automation to strengthen your security posture. The talk covers essential topics from the "software bible" to practical solutions for addressing configuration-related vulnerabilities in DevSecOps environments.

Configurations: The Weak Link in the Security Chain

Conf42
Add to list