Completed
Why Custom Profiles?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Golden Ticket - Docker and High Security Microservices
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 You've seen Microservices before
- 3 Your Legacy Application
- 4 The Principle of Least Privilege
- 5 The Principle of Least Surprise
- 6 The Principle of Least Access
- 7 Upsides of Microservices AppSec
- 8 Downsides of Microservices AppSec
- 9 Exploring Real World Compromise
- 10 Limit Compromises: OSI Edition
- 11 Layer 7 Authentication: Application
- 12 Layer 4/5 (7) Authentication: TLS
- 13 Layer 3 Authentication: IPSEC
- 14 Containers Map to Microservices
- 15 Pruning The Attack Tree
- 16 Minimal: Distro
- 17 Security starts with the base OS
- 18 Minimal Container?
- 19 Minimal: Container Images
- 20 General idea for Docker
- 21 Golang wiki server example
- 22 Mandatory Access Control
- 23 Nested AppArmor
- 24 Custom AppArmor Profiles
- 25 AppArmor Profile Gotchas
- 26 Why Custom Profiles?
- 27 Seccomp Profiles using strace
- 28 Seccomp Profiles using Seccomp
- 29 General Seccomp Pitfalls
- 30 Seccomp in Docker
- 31 Seccomp notes
- 32 The Problem of Managing Secrets
- 33 Other Security Recommendations