Главная
Study mode:
on
1
Introduction
2
PCI Compliance
3
Do or Do Not Trust
4
Limit Surface Area
5
PCI Compliant
6
Security is Hard
7
Software Development Process
8
Open Source Sock Shop
9
Content of Security
10
Container Security Aspects
11
Insert Container User
12
Capabilities
13
Example
14
libcap
15
capdrop
16
Cuban Acid
17
Recap
18
Did you know
19
Sock Locks
20
Network Segmentation in Policy
21
Demo Application
22
Firewall
23
Trump File
24
Firewalls
25
Network Segmentation
26
Testing
27
Network Policy bouncer
28
Example Network Policy
29
SoftwareDefined Network
30
Wrapping Up
31
Sock Shop
32
Wrap up
33
Source code
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore microservice security in an open source sock shop through this GOTO 2016 conference talk. Delve into PCI compliance, trust limitations, and surface area reduction strategies. Learn about container security aspects, including user insertion and capabilities. Discover network segmentation techniques, policy implementation, and software-defined networking. Gain insights into secure software development processes and practical applications in the context of an open-source sock shop. Understand the challenges and best practices for enhancing microservice security, with demonstrations and real-world examples provided throughout the presentation.

Secure Socks - Exploring Microservice Security in an Open Source Sock Shop

GOTO Conferences
Add to list