Liz's new Container Security book includes a Security Checklist covering items you should at least think about when considering how to secure your deployments running on containers. In this talk, Liz gives an overview of the checklist, and dives into the details on some potential weaknesses that you really need to avoid. The takeaway challenge is for you to check whether your own environments comply with the most important of these recommendations.
Aqua Security
VP Open Source Engineering
Cloud Native Computing Foundation
Organizer
CNCF
Organizer
Linux Foundation (CNCF)
Organizer
Organizer