Power BI Fundamentals - Create visualizations and dashboards from scratch
Save 43% on 1 Year of Coursera Plus
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about CI/CD pipeline security vulnerabilities and defense strategies in this 46-minute conference talk by Hugo Cooper. Explore how attackers can exploit YAML configurations and other pipeline components to gain unauthorized access, potentially escalating privileges all the way to root access. Discover common attack vectors targeting continuous integration and continuous deployment systems, understand the security implications of misconfigured pipelines, and examine real-world scenarios where CI/CD weaknesses have been exploited. Gain practical knowledge about implementing robust countermeasures to protect your development and deployment workflows, including best practices for securing pipeline configurations, managing secrets, controlling access permissions, and monitoring for suspicious activities within your CI/CD infrastructure.
Syllabus
From YAML To Root: CI/CD Pipeline Attacks And Countermeasures - Hugo
Taught by
Cooper