DSO 211 - Identifying Threats to Containers in a DevSecOps Framework
Widespread adoption of cloud computing and DevOps have led to containers becoming the most popular and efficient way to deploy applications. However, containerization presents enterprise security risks that question existing security policies and compliance frameworks. This course provides a necessary understanding of known attacks required to improve the security of container application deployments.
Upon successful completion of this course, learners will have the knowledge and skills required to meet compliance requirements while developing a DevSecOps mindset, including:
- The importance of Identifying threats to containers and data in the DevSecOps framework
- Why containers are particularly susceptible to image vulnerabilities, and how to mitigate the threat by rebuilding images as part of security updates.
- How to validate external images to prevent malware, unintended functionality, functional bugs, or components with known vulnerabilities into your environment
- Securely encrypting communication channels to avoid man-in-the-middle attacks designed to extract image contents, compromise credentials used to access registries or tamper with images being sent to orchestrators
Looking To Learn More?
Request more information on our courses and labs.