Completed
Unsafe Authorization Patterns
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Top 10 Istio Security Risks and Mitigation Strategies
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What is a security risk
- 3 Why do I care about security
- 4 Security in a Service Mesh
- 5 Threat Actors
- 6 Misconfiguration
- 7 Insecure Communication
- 8 Unsafe Authorization Patterns
- 9 Weak Service Account Authorization
- 10 Broken Object Level Authorization
- 11 Supply Chain Vulnerabilities
- 12 Ingress Traffic Capture Limitations
- 13 Egress Traffic Capture Limitations
- 14 Monitoring Failures
- 15 What is your security risk
- 16 Conclusion