Главная
Study mode:
on
1
Introduction
2
Welcome
3
Agenda
4
OS Top 10
5
The Problem
6
The Solution
7
Cake Example
8
Recap
9
Desktop to Deployment
10
CI Monitoring
11
Introducing Checkov
12
Checkov Customization
13
Shift Left
14
Admission Controller
15
K8s Setup
16
Whats Hatch 4
17
Precommit
18
Command Line
19
Pros
20
Base Deployment
21
Empathy
22
Conclusion
23
Questions
Description:
Explore Kubernetes security from desktop to deployment in this 50-minute CNCF conference talk. Learn about the OS Top 10, understand common security challenges, and discover effective solutions. Dive into CI monitoring, get introduced to Checkov for security scanning, and explore its customization options. Understand the concept of shifting left in security practices and learn about admission controllers in Kubernetes. Gain insights into K8s setup, precommit hooks, and command-line tools. Examine the importance of empathy in security implementations and base deployments. Conclude with a Q&A session to address any remaining questions on K8s security best practices.

Desktop to Deployment: Kubernetes Security with Checkov

CNCF [Cloud Native Computing Foundation]
Add to list