From the course: Microservices Security Workshop: From Build to Production
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
CI/CD security
From the course: Microservices Security Workshop: From Build to Production
CI/CD security
- [Instructor] Now that we've worked through many of the design and code level considerations for securing and building your microservices, it's time to shift our focus to the deployment and testing of them. Everything we've done so far, architectural design, static analysis, dependency checks, secret scanning, all of that can be run locally, but most of it is far more effective when integrated directly into your build and deployment pipelines. This is where secure CI/CD comes into play. Unfortunately, the security of CI/CD systems is often neglected. These systems are complex, deeply customized, and in many cases, managed entirely by platform or DevOps teams with little direct oversight from security. But for microservices in particular, a secure CI/CD process is essential not just for security, but to create consistency, observability, and enhance developer productivity. In fact, one of the main advantages of microservices is the ability to have clear visibility into how each…
Contents
-
-
-
-
-
(Locked)
CI/CD security4m 2s
-
(Locked)
Securing artifact repositories (artifactories)3m 44s
-
(Locked)
Container scanning4m 4s
-
(Locked)
DAST for microservices3m 22s
-
(Locked)
Microservice backups3m 54s
-
(Locked)
Encryption and service mesh3m 30s
-
(Locked)
Red teaming and penetration testing (pentesting)3m 58s
-
(Locked)
Challenge: Run and fix a container scan59s
-
(Locked)
Solution: Run and fix a container scan3m 2s
-
(Locked)
-
-