Cloud Native Security for the Rest of Us

June 16, 2023

Your mission is to secure the vast tracts of land of the cloud native security landscape. Where do you even start?!? It would be preposterous to cover that whole topic in a single session, but we can at least map it out. Our plan is to break it down into three key areas and review each in turn. - Platform: securing and upgrading our control planes and nodes; isolating compute, storage, and network resources; managing privileges and secrets - User management and permissions: various ways to authenticate and authorize user access; leveraging tools like RBAC and Namespaces, and some common “gotchas” - Software supply chain: what that means; some actual threat models are; how to mitigate them You’ll leave this session with a stronger understanding of the breadth and depth of cloud native security and resources to further develop your knowledge.

Previous
What's New in Spring Batch 5?
What's New in Spring Batch 5?

Spring Batch 5 is the culmination of two years of work, including dozens of improvements, features, and bug...

Next Video
How to Turn a New Tool into an Essential Part of a Developer’s Workflow
How to Turn a New Tool into an Essential Part of a Developer’s Workflow

Making new products stick is challenging and getting people to use new tools is even more challenging. In t...