Securing application deployments in CI/CD environments

Binu Ramakrishnan highlights current security risks and CI/CD threat modeling and presents security patterns-based techniques to mitigate these risks, including a novel idea called auth events to delegate user privileges to CI/CD workflow jobs.

By Binu Ramakrishnan
November 22, 2016
Lights Lights (source: carloroberto9 via Pixabay)

This video was originally recorded in September 2016 at the O’Reilly Security Conference in New York.

Visit Safari for full access to sessions, training, and keynotes from this event.

Learn faster. Dig deeper. See farther.

Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.

Learn more
Post topics: Security
Share: