Recorded Date:
Duration: 2.5 hours
Presenter(s): Chuck Easttom

Description:

  1. Bring Your Own License
    1. Defining it
  2. General Container Security
    1. Secure the host
    2. Secure the networking environment
    3. Secure pipeline
    4. Secure application
  3. Challenges for BYOL
    1. Difficult to manage app security
    2. May introduce new attack vectors
  4. Security measures for BYOL
    1. Ensure apps are digitally signed
    2. Application access control
    3. Thin and short-lived containers
    4. Monitor containers
      1. Particularly traffic into and out of container
    5. Understand dependencies
    6. Consider SAST and DAST for new BYOL