Secure Your Kubernetes Software Supply Chain using Snyk, Amazon Inspector, Datree and NeuVector

  Рет қаралды 314

Lukonde Mwila

Lukonde Mwila

Күн бұрын

Security around containers and Kubernetes is a very hot topic at the moment because of the increasing awareness of the vulnerabilities that exist in these technologies. To improve your container and Kubernetes security posture, you should start by identifying the vulnerabilities and then pick a tool or tools that will help you address the identified weaknesses and risks.
The software supply chain refers to the various activities involved in the software development lifecycle from initial development to a destination runtime environment. Securing the software supply chain entails securing the different components in this process from developer practices, to dependency libraries, infrastructure components, network protocols, external integrations, and deployment methods.
In this video, I'll talk about how you can secure your Kubernetes software supply chain by addressing different layers of vulnerabilities with tools like Snyk, Amazon Inspector, Datree, and NeuVector.
#kubernetes #kubernetessecurity #cloudnative
Timestamps:
00:00 - Introduction
00:12 - Container and Kubernetes security overview
02:17 - Kubernetes software supply chain
02:51 - Securing container images with Snyk and Amazon Inspector
10:01 - Using policies to secure Kubernetes workloads with Datree and NeuVector
Connect:
GitHub: github.com/LukeMwila
Twitter: / luke9ine
Medium: / outlier.developer
LinkedIn: / lukonde-mwila-25103345
If you found this video helpful, please like the video and subscribe to the channel!

Пікірлер
Container Best Practices with Datree
15:45
Lukonde Mwila
Рет қаралды 254
Using Skaffold and GitHub Actions for Deployments to Amazon EKS
14:04
Clowns abuse children#Short #Officer Rabbit #angel
00:51
兔子警官
Рет қаралды 73 МЛН
Llegó al techo 😱
00:37
Juan De Dios Pantoja
Рет қаралды 28 МЛН
Using Istio Gateway to Route Traffic to Microservices on Amazon EKS
14:07
Multicloud Kubernetes with Rancher
9:10
Lukonde Mwila
Рет қаралды 1,1 М.
Taints and Tolerations in Kubernetes
10:13
Lukonde Mwila
Рет қаралды 1 М.
Scientific Concepts You're Taught in School Which are Actually Wrong
14:36
Secure Istio Gateway Traffic with TLS Encryption on Amazon EKS
13:10
Using Argo CD & Datree for Stable Kubernetes CI/CD Deployments
16:51
Lukonde Mwila
Рет қаралды 2,2 М.
The cloud is over-engineered and overpriced (no music)
14:39
Tom Delalande
Рет қаралды 501 М.
Pod Topology Spread Constraints in Kubernetes
9:43
Lukonde Mwila
Рет қаралды 3,2 М.
Копия iPhone с WildBerries
1:00
Wylsacom
Рет қаралды 832 М.
OZON РАЗБИЛИ 3 КОМПЬЮТЕРА
0:57
Кинг Комп Shorts
Рет қаралды 1,9 МЛН