Desktop to Deployment: Kubernetes Security with Checkov
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Explore Kubernetes security from desktop to deployment in this 50-minute CNCF conference talk. Learn about the OS Top 10, understand common security challenges, and discover effective solutions. Dive into CI monitoring, get introduced to Checkov for security scanning, and explore its customization options. Understand the concept of shifting left in security practices and learn about admission controllers in Kubernetes. Gain insights into K8s setup, precommit hooks, and command-line tools. Examine the importance of empathy in security implementations and base deployments. Conclude with a Q&A session to address any remaining questions on K8s security best practices.
Syllabus
Introduction
Welcome
Agenda
OS Top 10
The Problem
The Solution
Cake Example
Recap
Desktop to Deployment
CI Monitoring
Introducing Checkov
Checkov Customization
Shift Left
Admission Controller
K8s Setup
Whats Hatch 4
Precommit
Command Line
Pros
Base Deployment
Empathy
Conclusion
Questions
Taught by
CNCF [Cloud Native Computing Foundation]