Главная
Study mode:
on
1
Intro
2
OWASP Cloud Native Characteristics
3
OWASP Cloud Native Secure Architecture ✓ Container Isolation Control Plane Hardening Network Segmentation Encrypted Communications
4
OWASP Who's Job is it Anyway?
5
OWASP Isolating Containerized Workloads
6
OWASP Reconciler Pattern
7
OWASP Spoiler: Containers Aren't Sandboxes
8
OWASP The Gateway Drug
9
OWASP Control Groups & Namespaces
10
OWASP Build Integrity & Attestation
11
OWASP User Namespaces
12
OWASP Rootless Containers
13
OWASP Authentication
14
OWASP Fixing the Problem
15
OWASP Authorization
16
OWASP Create Roles & Bindings
17
OWASP Controller Pattern
18
OWASP Admission Controllers
19
OWASP Designing a PodSecurity Policy
20
OWASP Sidecar Pattern Decomposition pattern
21
OWASP Secrets Management
22
OWASP Dynamic Secrets
23
OWASP Example - Retrieve & Mount a Secret
Description:
Explore cloud native security patterns in this OWASP NLChapter meeting talk. Dive into essential topics such as container isolation, control plane hardening, network segmentation, and encrypted communications. Learn about the reconciler pattern, container sandboxing limitations, and the importance of build integrity and attestation. Discover user namespaces, rootless containers, and effective authentication and authorization strategies. Examine the controller pattern, admission controllers, and PodSecurity policy design. Gain insights into the sidecar pattern, secrets management, and dynamic secrets implementation. Apply these concepts through practical examples, including retrieving and mounting secrets in cloud native environments.

Running at Light Speed - Cloud Native Security Patterns

OWASP Foundation
Add to list