Completed
FOLLOW SECURITY BEST PRACTICES
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cloud Native Security for the Rest of Us
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 FOLLOW SECURITY BEST PRACTICES
- 3 4 C's OF CLOUD NATIVE SECURITY
- 4 SECURING CONTROL PLANES & NODES CONT'D
- 5 ISOLATING COMPUTE
- 6 ISOLATING NETWORK RESOURCES
- 7 MANAGING SECRETS
- 8 AUTHENTICATION (AUTHN)
- 9 RBAC AUDITING
- 10 NAMESPACES vs CLUSTER WIDE
- 11 GOTCHA: ADMIN PERMISSIONS
- 12 SOME ACTUAL THREAT MODELS & HOW TO MITIGATE THEM
- 13 DON'T FORGET ABOUT YOUR CODE