Главная
Study mode:
on
1
Intro
2
Security (A.K.A. InfoSec)
3
Everything as code
4
Invert our thinking
5
The Importance of Supply Chain Context - Part 1
6
Declarative = Deterministic
7
The (Supply Chain) Layers
8
Secure the base (or cloud)
9
Securing the code (The actual application source code)
10
Securing your dependencies FRIENDS
11
Securing the (OSS) supply chain
12
Securing the image • Pros Teaches best practices
13
Layer 5: Securing the deployment . Abstractions Difficult to scan the code
14
The Runtime - Maintain the state of security!
15
Key takeaways
Description:
Join a 50-minute Linux Foundation live webinar exploring comprehensive supply chain security strategies. Delve into InfoSec principles, "everything as code" approaches, and the importance of supply chain context. Learn about declarative and deterministic security practices, securing various layers from infrastructure to application code, and protecting dependencies. Explore techniques for safeguarding open-source supply chains, container images, and deployments. Discover best practices for maintaining runtime security and gain valuable insights to enhance your organization's overall security posture.

Supply Chain Security: From Infrastructure to Application, Code to Cloud

Linux Foundation
Add to list