Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the development of an in-house asset mapping and external attack tool in this 16-minute conference talk from DevConf.CZ 2023. Discover how Red Hat addresses the challenges of managing complex systems and information by creating a unified view for various risk activities. Learn about the tool's objectives, including real-time inventory data collection from multiple cloud environments, vulnerability mapping to assets and owners, external-internal asset visibility, attack surface analysis based on asset exposure and vulnerabilities, and future attack predictions. Gain insights into how this tool differs from others by being tailored to Red Hat environments and providing checks required for Red Hat standards and controls. Understand the importance of combining CMDB, vulnerability, and asset inventory visibility for effective security management in large-scale systems.