Completed
Secret Management
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Introducing the OWASP Top 10 for Kubernetes
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 How secure is Kubernetes
- 3 Insecure workload configurations
- 4 Supply chain vulnerabilities
- 5 Overly permissive RBack configuration
- 6 Lack of centralized policy enforcement
- 7 Inadequate logging and monitoring
- 8 Broken authentication
- 9 Missing network segmentation
- 10 Redis example
- 11 Service Mesh
- 12 Secret Management
- 13 Components
- 14 CIS Benchmark
- 15 API Versions
- 16 Kubernetes isnt secure
- 17 Questions