Securing application deployments in CI/CD environments
Binu Ramakrishnan highlights current security risks and CI/CD threat modeling and presents security patterns-based techniques to mitigate these risks, including a novel idea called auth events to delegate user privileges to CI/CD workflow jobs.
This video was originally recorded in September 2016 at the O’Reilly Security Conference in New York.
Visit Safari for full access to sessions, training, and keynotes from this event.