Running at Light Speed - Cloud Native Security Patterns

Running at Light Speed - Cloud Native Security Patterns

OWASP Foundation via YouTube Direct link

OWASP Authentication

13 of 23

13 of 23

OWASP Authentication

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Running at Light Speed - Cloud Native Security Patterns

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 OWASP Cloud Native Characteristics
  3. 3 OWASP Cloud Native Secure Architecture ✓ Container Isolation Control Plane Hardening Network Segmentation Encrypted Communications
  4. 4 OWASP Who's Job is it Anyway?
  5. 5 OWASP Isolating Containerized Workloads
  6. 6 OWASP Reconciler Pattern
  7. 7 OWASP Spoiler: Containers Aren't Sandboxes
  8. 8 OWASP The Gateway Drug
  9. 9 OWASP Control Groups & Namespaces
  10. 10 OWASP Build Integrity & Attestation
  11. 11 OWASP User Namespaces
  12. 12 OWASP Rootless Containers
  13. 13 OWASP Authentication
  14. 14 OWASP Fixing the Problem
  15. 15 OWASP Authorization
  16. 16 OWASP Create Roles & Bindings
  17. 17 OWASP Controller Pattern
  18. 18 OWASP Admission Controllers
  19. 19 OWASP Designing a PodSecurity Policy
  20. 20 OWASP Sidecar Pattern Decomposition pattern
  21. 21 OWASP Secrets Management
  22. 22 OWASP Dynamic Secrets
  23. 23 OWASP Example - Retrieve & Mount a Secret

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.