Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security challenges and best practices for Software Defined Infrastructures (SDI) in this 26-minute conference talk from AppSec EU 2017. Delve into the advantages and potential vulnerabilities of configuration management tools like Puppet and Chef. Learn about the attack surface and threats in SDI deployments, and discover techniques for identifying vulnerabilities through source code analysis. Gain insights from real-world security reviews and understand how to remediate common security issues. Cover topics including insufficiently protected interfaces, insecure handling of secrets, encryption of configuration values, logging configuration changes, credential management, untrusted code, and implementing a robust security lifecycle. Benefit from practical examples and lessons learned to improve the security of your SDI implementations.
Syllabus
Introduction
About Theodoor
Explanation
Software Defined Infrastructure
SPI Architecture
Advantages of SPI
SPI as an attack factor
Insufficiently protected interfaces
Insecure handling of secrets
Encrypt Configuration Values
Logging Configuration Changes
Credentials
Untrusted Code
Security Lifecycle
Examples
Taught by
OWASP Foundation