Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Securing the Software Supply Chain with TUF and Docker - Protecting Against Distribution Attacks

Docker via YouTube

Overview

Explore the critical aspects of securing software distribution and updates in this 40-minute conference talk. Learn about The Update Framework (TUF) and its integration with Docker's Notary software to protect against various attack vectors. Discover how TUF addresses key revocation, mitigates man-in-the-middle attacks, and reduces the impact of repository compromise. Examine new techniques for verifying different stages of the software supply chain, including development, build, and quality assurance processes. Gain insights into the roles of various stakeholders, the concept of Darker Manifests, and the importance of standardization in enhancing software security.

Syllabus

Intro
What is an attack vector
Can we just apply crypto
Is it easy to provide security
Support dont judge
Roles
TUF
Is Docker vulnerable
Docker is secure
Darker Manifests
Whats Next
Attackers
Backdoors
Project Owner
Conclusion
standardization process
questions

Taught by

Docker

Reviews

Start your review of Securing the Software Supply Chain with TUF and Docker - Protecting Against Distribution Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.