Session

CD Threat Vectors: Examples and Mitigation Strategies

CD is the backbone of the software development, delivery, and deployment process. In recent times, vulnerabilities in the CD pipeline have been discovered leading to alarming consequences for the industry as a whole. Securing the pipeline, therefore is critical to every organization, in addition to other forms.
In this talk I intend to demonstrate a couple of threat vectors along with strategies to discover, mitigate, and contain them. These threats are based on OWASP and CISA+ NIST frameworks. The examples will include egress filtering and potential file tampering. I intend to demonstrate a combination of tools and techniques that will help improve the CD pipeline by making it more secure.

Ram Iyengar

Developer Advocate at the Cloud Foundry Foundation

Chennai, India

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top