Ensuring DevOps teams are making use of only authorized images is a key element of cloud native security. But with teams relying on open source and third party software for speed and repeatability, DevSecOps teams can’t depend solely on trusted images entering the pipeline.
In this webinar, we will discuss a set of strategies that DevSecOps teams can maintain to manage the risk of the software supply chain as attackers find ways through open source projects and commonly used packages as a vector for malicious code and launch exploits at run time.
In addition, how do we secure the infrastructure and application workloads to reduce the attack surface, prevent unwanted threats, and deny unauthorized access to the platform
Reasons to watch
Strategic Partner Product Marketing at Aqua Security
Solution Architect, Mirantis
Team Lead & Associate Solutions Architect at Aqua