HOW TO BUILD A CLOUD SECURITY PROGRAM WITH CONTAINERS
Cloud Security Podcast - En podcast af Cloud Security Podcast Team
Kategorier:
Cloud Security Podcast - This month we are talking about "Building on the AWS Cloud" and next up on this series, we spoke to Mrunal Shah (Mrunal's Linkedin), Head of Container Security at Warner Bros. Discovery. We talk about how to build a Container or K8s security program while best practices are maintained and team have the right capability and tools. 4 Cs - Cloud, Container & Cluster, Code can be foundational to this Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host Twitter: Ashish Rajan (@hashishrajan) Guest Twitter: Mrunal Shah (Mrunal's Linkedin) Podcast Twitter - @CloudSecPod @CloudSecureNews If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security News - Cloud Security Academy Spotify TimeStamp for Interview Questions (00:00) Intro (02:01) https://snyk.io/csp (02:30) Mrunal's Professional Background (03:04) Why containers are popular (technical reasons) (04:05) Why containers are popular (leadership reasons) (05:39) Challenges with running a Container Security Program (Leadership) (06:34) Team skill challenge in a Container Security Program (08:57) When to pick AWS ECS vs AWS EKS? (10:53) ECS or EKS for building Banking Applications? (13:12) Would Kubernetes/ Containers be preferred for security reasons? (15:04) What would Amazon's responsibility be for security with ECS/EKS? (16:13) What is bad about working with Containers in AWS? (19:40) Is there a need for anti-virus in a container world? (20:36) Balance of security when working with containers? (22:08) Threat Detection and Prevention in a Container Security Program (22:57) Using AWS Services for Threat Detection with Containers? (25:14) Runtime Threat Discovery vs Agentless Threat Discovery for containers in Cloud? (29:11) Prevention on the left vs Detection on the right of SDLC (29:22) Cluster Misconfig vs Service Misconfigurations? (30:19) Vulnerability Management vs Misconfiguration Management? (31:50) Inspector in a Container Security Program? (32:36) Detective in a Container Security Program? (35:36) Can AWS Services help when Non-AWS services are in use? See you at the next episode!