Are Your Helm Charts Secure? - Uncovering Hidden Supply Chain Threats
Platform Engineering via YouTube
Gain a Splash of New Skills - Coursera+ Annual Just ₹7,999
AI Engineer - Learn how to integrate AI into software applications
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical security vulnerabilities in Helm charts and learn proven strategies to protect your Kubernetes deployments from supply chain attacks in this 57-minute practical workshop. Discover how misconfigured charts, unverified dependencies, and inadequate RBAC settings can expose your containerized workloads to significant security risks. Master essential techniques for validating public Helm charts and dependencies from popular open-source projects before deployment, ensuring every asset meets security standards. Learn to automate compliance processes by implementing vulnerability scanning with Trivy and enforcing real-time security policies using OPA Gatekeeper. Understand how to audit and manage Helm charts effectively before distribution through secure repositories, preventing potential supply chain compromises. Gain insights into the reality that most charts are insecure by default and require additional security validation from your development team. Develop comprehensive strategies for maintaining supply chain integrity while meeting regulatory compliance requirements through proper artifact management practices.
Syllabus
Are your Helm charts secure? Uncovering hidden supply chain threats
Taught by
Platform Engineering