Are Your Helm Charts Secure? - Uncovering Hidden Supply Chain Threats
Platform Engineering via YouTube
Master Windows Internals - Kernel Programming, Debugging & Architecture
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore critical security vulnerabilities in Helm charts and learn proven strategies to protect your Kubernetes deployments from supply chain attacks in this 57-minute practical workshop. Discover how misconfigured charts, unverified dependencies, and inadequate RBAC settings can expose your containerized workloads to significant security risks. Master essential techniques for validating public Helm charts and dependencies from popular open-source projects before deployment, ensuring every asset meets security standards. Learn to automate compliance processes by implementing vulnerability scanning with Trivy and enforcing real-time security policies using OPA Gatekeeper. Understand how to audit and manage Helm charts effectively before distribution through secure repositories, preventing potential supply chain compromises. Gain insights into the reality that most charts are insecure by default and require additional security validation from your development team. Develop comprehensive strategies for maintaining supply chain integrity while meeting regulatory compliance requirements through proper artifact management practices.
Syllabus
Are your Helm charts secure? Uncovering hidden supply chain threats
Taught by
Platform Engineering