Completed
use pipelines to analyze security vulnerabilities automatically
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Infrastructure as Code Security Best Practices and Strategies
Automatically move to the next video in the Classroom when playback concludes
- 1 intro
- 2 preamble
- 3 about joshua
- 4 let's begin
- 5 tag resources properly
- 6 avoid insecure defaults and regurarly check for announcements in cloud platforms
- 7 secret management & permission management
- 8 why?
- 9 track and manage changes using version control tools
- 10 use pipelines to analyze security vulnerabilities automatically
- 11 be careful when managing resources with iac in pipelines!
- 12 poisoned pipeline execution
- 13 protect specific resources from accidental deletion or modification
- 14 the end