Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Are Your Helm Charts Secure? - Uncovering Hidden Supply Chain Threats

Platform Engineering via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical security vulnerabilities in Helm charts and learn proven strategies to protect your Kubernetes deployments from supply chain attacks in this 57-minute practical workshop. Discover how misconfigured charts, unverified dependencies, and inadequate RBAC settings can expose your containerized workloads to significant security risks. Master essential techniques for validating public Helm charts and dependencies from popular open-source projects before deployment, ensuring every asset meets security standards. Learn to automate compliance processes by implementing vulnerability scanning with Trivy and enforcing real-time security policies using OPA Gatekeeper. Understand how to audit and manage Helm charts effectively before distribution through secure repositories, preventing potential supply chain compromises. Gain insights into the reality that most charts are insecure by default and require additional security validation from your development team. Develop comprehensive strategies for maintaining supply chain integrity while meeting regulatory compliance requirements through proper artifact management practices.

Syllabus

Are your Helm charts secure? Uncovering hidden supply chain threats

Taught by

Platform Engineering

Reviews

Start your review of Are Your Helm Charts Secure? - Uncovering Hidden Supply Chain Threats

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.