Security & Policy Configurations for Infrastructure as Code

Rosemary Wang (Developer Advocate, HashiCorp) sharing on how to scale your policy as code for cloud infrastructure.



When you use cloud infrastructure, you might find yourself accidentally applying a configuration for an open storage bucket, unencrypted queue, or unrestricted access control. At worst, these misconfigurations can be exploited by bad actors. At best, they get duplicated across an organization without anyone knowing better. Over time, this duplication becomes painful to manage as more teams collaborate on infrastructure, systems grow more complex, and new audit requirements come to light. How do you know your application and infrastructure configurations adhere to compliance and security standards? In this talk, you’ll learn how to scale your policy as code for cloud infrastructure. We’ll get hands-on with a combination of static and dynamic analysis to implement rules that automatically verify the security and compliance of your configurations as part of your development lifecycle.

ūüďć Date: Wednesday, June 30th, 2021 @ 10AM PST


ūüĒļ 5:00 – 5:10 Introductions

ūüĒļ 5:10 – 5:40 Presentation

ūüĒļ 5:40 – 6:00 Q&A


ūüĒ∂ Rosemary Wang, Developer Advocate (HashiCorp)

Rosemary Wang works to bridge the technical and cultural barriers in infrastructure, security, and application development. She has a fascination for solving intractable problems with code as a contributor and educator of open-source projects. When she is not drawing on whiteboards, Rosemary valiantly attempts to hack stacks of various infrastructure systems on her laptop while watering her houseplants.

ūüĒ∂ Jim Walnum, Ex-Vice President of DevOps (Goldman Sachs)

ūüíē Cloud-Native @Scale Meetup community ūü§ó ūüíē

The event is finished.


Jun 30 2021


1:00 pm - 2:00 pm
QR Code

Leave A Reply

Your email address will not be published. Required fields are marked *