Главная
Study mode:
on
1
Introduction
2
How to keep secrets safe
3
DevOps security collaboration
4
Security islands
5
Strong authentication
6
The secret zero problem
7
Authentication
8
Conjurer
9
SPiffy Workflow
10
SPiffy Demo
11
Demo Host
12
Demo Environment
13
SUMMIN
14
Kubernetes Secrets
15
Demonstration
16
QA
Description:
Explore best practices for securing application access within Kubernetes and addressing challenges of secrets management in this 55-minute webinar. Learn how to build secure Kubernetes applications faster without being a security expert, understand the concept of "secret zero," and discover the importance of strong authentication. Gain insights into open-source secrets management solutions like Kubernetes Secrets and Conjur for securing access, enforcing policy, and authenticating access requests when working with CNCF projects. Watch demonstrations of how applications can securely access databases and other sensitive resources without requiring secrets using the Secretless pattern. Discover strategies for developers to work more effectively with security teams, bridging the gap between development and security concerns in cloud-native environments. Presented by Jody Hunt, Director of DevOps Security at CyberArk, this webinar covers topics such as DevOps security collaboration, security islands, authentication methods, and includes practical demonstrations of Kubernetes Secrets and other security tools. Read more

Kubernetes Secrets Management - Build Secure Apps Faster Without Secrets

CNCF [Cloud Native Computing Foundation]
Add to list