Secure Your Kubernetes Software Supply Chain using Snyk, Amazon Inspector, Datree and NeuVector
Security around containers and Kubernetes is a very hot topic at the moment because of the increasing awareness of the vulnerabilities that exist in these technologies. To improve your container and Kubernetes security posture, you should start by identifying the vulnerabilities and then pick a tool or tools that will help you address the identified weaknesses and risks.
The software supply chain refers to the various activities involved in the software development lifecycle from initial development to a destination runtime environment. Securing the software supply chain entails securing the different components in this process from developer practices, to dependency libraries, infrastructure components, network protocols, external integrations, and deployment methods.
In this video, I'll talk about how you can secure your Kubernetes software supply chain by addressing different layers of vulnerabilities with tools like Snyk, Amazon Inspector, Datree, and NeuVector.
#kubernetes #kubernetessecurity #cloudnative
Timestamps:
00:00 - Introduction
00:12 - Container and Kubernetes security overview
02:17 - Kubernetes software supply chain
02:51 - Securing container images with Snyk and Amazon Inspector
10:01 - Using policies to secure Kubernetes workloads with Datree and NeuVector
Connect:
GitHub: https://github.com/LukeMwila
Twitter: https://twitter.com/LuKE9ine
Medium: https://medium.com/@outlier.developer
LinkedIn: https://www.linkedin.com/in/lukonde-mwila-25103345/
If you found this video helpful, please like the video and subscribe to the channel!
Видео Secure Your Kubernetes Software Supply Chain using Snyk, Amazon Inspector, Datree and NeuVector канала Lukonde Mwila
The software supply chain refers to the various activities involved in the software development lifecycle from initial development to a destination runtime environment. Securing the software supply chain entails securing the different components in this process from developer practices, to dependency libraries, infrastructure components, network protocols, external integrations, and deployment methods.
In this video, I'll talk about how you can secure your Kubernetes software supply chain by addressing different layers of vulnerabilities with tools like Snyk, Amazon Inspector, Datree, and NeuVector.
#kubernetes #kubernetessecurity #cloudnative
Timestamps:
00:00 - Introduction
00:12 - Container and Kubernetes security overview
02:17 - Kubernetes software supply chain
02:51 - Securing container images with Snyk and Amazon Inspector
10:01 - Using policies to secure Kubernetes workloads with Datree and NeuVector
Connect:
GitHub: https://github.com/LukeMwila
Twitter: https://twitter.com/LuKE9ine
Medium: https://medium.com/@outlier.developer
LinkedIn: https://www.linkedin.com/in/lukonde-mwila-25103345/
If you found this video helpful, please like the video and subscribe to the channel!
Видео Secure Your Kubernetes Software Supply Chain using Snyk, Amazon Inspector, Datree and NeuVector канала Lukonde Mwila
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Container Best Practices with DatreeUsing Argo CD & Datree for Stable Kubernetes CI/CD DeploymentsCreate an RKE Kubernetes Cluster in AWS with TerraformTaints and Tolerations in KubernetesUsing Skaffold and GitHub Actions for Deployments to Amazon EKSSecure Istio Gateway Traffic with TLS Encryption on Amazon EKSHow to Configure mTLS in Istio for Secure Kubernetes Workload CommunicationMulticloud Kubernetes with RancherSecurity with Istio: Using Authorization PoliciesHow to Setup External CA Integration in IstioOptimizing Istio Ingress Gateway PerformanceGitOps Canary Deployments to Kubernetes with Istio, Argo CD and FlaggerUsing Argo CD and Rancher for Kubernetes Multi-tenancy & GitOpsPod Topology Spread Constraints in KubernetesCI/CD Deployments with AWS CodeBuild and GitOps to EKS and AKS Kubernetes ClustersUsing Istio Gateway to Route Traffic to Microservices on Amazon EKSPort Forwarding in Kubernetes with kubectlGetting Started with ArgoCD for GitOps DeploymentsManaging Sensitive Data in Kubernetes with Sealed Secrets and External Secrets Operator (ESO)Manage Amazon EKS Cluster with Rancher