Completed
OWASP Designing a PodSecurity Policy
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Running at Light Speed - Cloud Native Security Patterns
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 OWASP Cloud Native Characteristics
- 3 OWASP Cloud Native Secure Architecture ✓ Container Isolation Control Plane Hardening Network Segmentation Encrypted Communications
- 4 OWASP Who's Job is it Anyway?
- 5 OWASP Isolating Containerized Workloads
- 6 OWASP Reconciler Pattern
- 7 OWASP Spoiler: Containers Aren't Sandboxes
- 8 OWASP The Gateway Drug
- 9 OWASP Control Groups & Namespaces
- 10 OWASP Build Integrity & Attestation
- 11 OWASP User Namespaces
- 12 OWASP Rootless Containers
- 13 OWASP Authentication
- 14 OWASP Fixing the Problem
- 15 OWASP Authorization
- 16 OWASP Create Roles & Bindings
- 17 OWASP Controller Pattern
- 18 OWASP Admission Controllers
- 19 OWASP Designing a PodSecurity Policy
- 20 OWASP Sidecar Pattern Decomposition pattern
- 21 OWASP Secrets Management
- 22 OWASP Dynamic Secrets
- 23 OWASP Example - Retrieve & Mount a Secret