Welcome to the pure security lecture in the series, we ll talk about what Zero Trust means, what (general) Cloud Security Guidelines we have and how to interpret them practically (and in a way that you can work with it in real life). We will explain what a ThreatModel is and some general jargon of the field. This will quickly bring us to Identity and IAM, as the new perimeter of
Last Updated: 2024-03-17
How to approach the jungle of regulations out there, without sinking endless time into it and without being a lawyer?
What do all these buzzwords mean and which ones are relevant in daily life?
IAM and general design rules in IDPs
A workable definition of zero trust and some overall best practise in how to approach designing a good "security first" project.
We will cover the following topics:
By the end of today's lecture, you should have
Somethings are easier, but you gotta do them ;)
Lets see what projects are out there and how they differ
For your increased productivity
Git clone pacman Git checkout features/workloadid
Fear not, we got you covered
Do you see the forest? Or just lots of trees?
What metrics that you defined for your product can you actually see or measure?
Which ones can you not see?
List at least 2 in each category
Congratulations, you've successfully completed this training