Running at Light Speed - Cloud Native Security Patterns

Running at Light Speed - Cloud Native Security Patterns

OWASP Foundation via YouTube Direct link

OWASP Create Roles & Bindings

16 of 23

16 of 23

OWASP Create Roles & Bindings

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Running at Light Speed - Cloud Native Security Patterns

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 OWASP Cloud Native Characteristics
  3. 3 OWASP Cloud Native Secure Architecture ✓ Container Isolation Control Plane Hardening Network Segmentation Encrypted Communications
  4. 4 OWASP Who's Job is it Anyway?
  5. 5 OWASP Isolating Containerized Workloads
  6. 6 OWASP Reconciler Pattern
  7. 7 OWASP Spoiler: Containers Aren't Sandboxes
  8. 8 OWASP The Gateway Drug
  9. 9 OWASP Control Groups & Namespaces
  10. 10 OWASP Build Integrity & Attestation
  11. 11 OWASP User Namespaces
  12. 12 OWASP Rootless Containers
  13. 13 OWASP Authentication
  14. 14 OWASP Fixing the Problem
  15. 15 OWASP Authorization
  16. 16 OWASP Create Roles & Bindings
  17. 17 OWASP Controller Pattern
  18. 18 OWASP Admission Controllers
  19. 19 OWASP Designing a PodSecurity Policy
  20. 20 OWASP Sidecar Pattern Decomposition pattern
  21. 21 OWASP Secrets Management
  22. 22 OWASP Dynamic Secrets
  23. 23 OWASP Example - Retrieve & Mount a Secret

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.