From the course: Container Security by InfoSec
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Hardening the build infrastructure
From the course: Container Security by InfoSec
Hardening the build infrastructure
- [Instructor] Hello and welcome back to the Container Security Learning path. We're in the Docker Security section and we're in the portion of that where we talk about CI/CD security considerations. And in fact, we're at Section 11: Hardening the build infrastructure. Right, why do we need to harden the build infrastructure? Well, all of the previous things you may have done to secure your containerized workloads, your applications you've put into Docker containers and you're running in production can be undone if your build infrastructure isn't also hardened, right? All of the work scanning images, making sure your applications are up-to-date, your third party libraries are up-to-date. You've hardened the host, the host, the Docker containers that you're running, but your build infrastructure, if it's not hardened, that's the weak point. That's the point that attackers will take to undo all of your good work. So, hardening the build infrastructure is critical, particularly if you're…
Contents
-
-
-
-
(Locked)
Container image misconfigurations19m 42s
-
(Locked)
Running dockers and persisting data27m 21s
-
(Locked)
Dockerfile best practices35m 30s
-
(Locked)
Namespaces and Cgroups16m 3s
-
(Locked)
Seccomp and capabilities20m 5s
-
(Locked)
Docker networking14m 30s
-
(Locked)
Inside the container22m 30s
-
(Locked)
Outside the container23m 32s
-
(Locked)
Reproducible builds15m 38s
-
(Locked)
Public vs internal image repositories12m 26s
-
(Locked)
Hardening the build infrastructure13m 34s
-
(Locked)
Iron vs VM vs cloud providers19m 35s
-
(Locked)
Immutable containers17m 40s
-
(Locked)
Live scanning11m 23s
-
(Locked)
Baseline and anomaly detection16m 8s
-
(Locked)
-
-