Live Webinar - April 30, 2020 10:00am PDT / 6:00pm GMT
Top 5 Cloud Native Pipeline Security Considerations
In this webinar, we’ll take a deep dive into Booz Allen Hamilton’s award-winning ways of securing modern software development. Specifically, we’ll share strong learnings and best practices to confidently protect your pipeline at each stage.
Join us to learn more about these top five (5) cloud-native security considerations:
- Turnkey security for your pipelines
- Container/host configuration management policies
- Protection against runtime threats
- Automating rule changes
- Post-mortem and prevention
- Steven Terrana, Senior Lead Technologist, Booz Allen Hamilton
- Dan Papandrea, Field CTO, Sysdig
You may also be interested in these upcoming live events:
Your developers need to be productive as you ramp containers and Kubernetes in production — without security being a blocker. With several software updates a day in a cloud-native environment, legacy tools can’t keep up. Running reliable and secure containers requires that security and DevOps work better together. We’ve got some great tips to share about automating and integrating security and compliance into the DevOps workflow, so your cloud applications ship faster.
As cloud-native becomes the standard for application deployment, DevOps teams are being asked to take ownership of security and compliance along with application performance and availability. Join us to hear how this is being addressed by customers across the Kubernetes lifecycle. We’ll also demo best practices for vulnerability management, runtime security, and container forensics with Google’s Anthos and GKE.
Many of your applications are now starting to run on containers in the cloud. This means compliance and managing risk are top priorities. Your security teams understand PCI guidelines, but the challenge is a clear mapping of those PCI controls to container/Kubernetes environments. Ultimately, you need to ensure compliance is not blocking your code from going into production.