Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CNCF [Cloud Native Computing Foundation]

Securing the Perimeter - CFCR/CFAR Chain of Custody With CI/CD Pipelines

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore a comprehensive conference talk on securing CI/CD pipelines and establishing a chain of custody in Kubernetes environments. Dive into the critical aspects of ensuring end-to-end security in software delivery processes, including transmission security, developer key rotation, signed git commits, and independently reproducible build verification. Learn about implementing signed release artifacts and runtime authority for immutable containers to achieve a secure chain of custody from development to production. Gain valuable insights into protecting your entire software delivery process against potential compromises, even with Kubernetes' secure-by-default posture.

Syllabus

Securing the Perimeter - CFCR/CFAR Chain of Custody With CI/CD Pipelines - Keith Strini, Pivo

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Securing the Perimeter - CFCR/CFAR Chain of Custody With CI/CD Pipelines

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.