Overview
Syllabus
Intro
Security for DevOps
A DevOps Feedback Loop
The million dollar question...
Adversaries...
What's the best method to hunt adversaries and targets?
How do I ensure I find them all?
Enumerating Attack Surface
Mechanics of an Attack
Converting to Human (DevOps)
Can we break this down into Architectural Basics?
Zoning & Containment
Asset Management
Authentication (Access)
Encryption
What about Application Security?
What does getting ahead look like?
DevSecOps Maturity Model & Behaviors
You might need a hat trick...
Full Stack Attack at RSA
Get Involved and Join the Community
Taught by
LASCON