Securing application deployments in CI/CD environments
Binu Ramakrishnan highlights current security risks and CI/CD threat modeling and presents security patterns-based techniques to mitigate these risks, including a novel idea called auth events to delegate user privileges to CI/CD workflow jobs.
![Lights](https://www.oreilly.com/content/wp-content/uploads/sites/2/2020/01/lights-1784782_1400-2d2eff3fa2db45c81f37df57ee8493cd.jpg)
This video was originally recorded in September 2016 at the O’Reilly Security Conference in New York.
Visit Safari for full access to sessions, training, and keynotes from this event.