The Container Security Checklist
You need to be signed in to add a collection
**Liz Rice presents you with THE security checklist you need to secure your deployments running on containers.** Liz's *Container Security* book, published by O’Reilly, includes a security checklist covering items you should at least think about when considering how to secure your deployments running on containers. In this talk, Liz presents an overview of the checklist and dives into the details on some potential weaknesses that you really need to avoid. The takeaway challenge is for you to check whether your own environments comply with the most important of these recommendations. **You'll learn:** </br> * What your security checklist should include </br> * What your security checklist definitely shouldn't include </br> * If you environments comply with these recommendations </br> **What past GOTO attendees say about Liz Rice's talks:** </br> * *"She was amazing! Liz has chops! Fascinating and well presented"* * *"Great speaker and interesting topic!"* * *"Very, very useful"*
Transcript
Liz Rice presents you with THE security checklist you need to secure your deployments running on containers.
Liz's Container Security book, published by O’Reilly, includes a security checklist covering items you should at least think about when considering how to secure your deployments running on containers.
In this talk, Liz presents an overview of the checklist and dives into the details on some potential weaknesses that you really need to avoid. The takeaway challenge is for you to check whether your own environments comply with the most important of these recommendations.
You'll learn:
- What your security checklist should include
- What your security checklist definitely shouldn't include
- If you environments comply with these recommendations
What past GOTO attendees say about Liz Rice's talks:
- "She was amazing! Liz has chops! Fascinating and well presented"
- "Great speaker and interesting topic!"
- "Very, very useful"