Overview
Syllabus
Intro
OWASP Cloud Native Characteristics
OWASP Cloud Native Secure Architecture ✓ Container Isolation Control Plane Hardening Network Segmentation Encrypted Communications
OWASP Who's Job is it Anyway?
OWASP Isolating Containerized Workloads
OWASP Reconciler Pattern
OWASP Spoiler: Containers Aren't Sandboxes
OWASP The Gateway Drug
OWASP Control Groups & Namespaces
OWASP Build Integrity & Attestation
OWASP User Namespaces
OWASP Rootless Containers
OWASP Authentication
OWASP Fixing the Problem
OWASP Authorization
OWASP Create Roles & Bindings
OWASP Controller Pattern
OWASP Admission Controllers
OWASP Designing a PodSecurity Policy
OWASP Sidecar Pattern Decomposition pattern
OWASP Secrets Management
OWASP Dynamic Secrets
OWASP Example - Retrieve & Mount a Secret
Taught by
OWASP Foundation