Security & Policy Configurations for Infrastructure as Code
Rosemary Wang (Developer Advocate, HashiCorp) sharing on how to scale your policy as code for cloud infrastructure.
When you use cloud infrastructure, you might find yourself accidentally applying a configuration for an open storage bucket, unencrypted queue, or unrestricted access control. At worst, these misconfigurations can be exploited by bad actors. At best, they get duplicated across an organization without anyone knowing better. Over time, this duplication becomes painful to manage as more teams collaborate on infrastructure, systems grow more complex, and new audit requirements come to light. How do you know your application and infrastructure configurations adhere to compliance and security standards? In this talk, you’ll learn how to scale your policy as code for cloud infrastructure. We’ll get hands-on with a combination of static and dynamic analysis to implement rules that automatically verify the security and compliance of your configurations as part of your development lifecycle.
📍 Date: Wednesday, June 30th, 2021 @ 10AM PST
🔺 5:00 – 5:10 Introductions
🔺 5:10 – 5:40 Presentation
🔺 5:40 – 6:00 Q&A
🔶 Rosemary Wang, Developer Advocate (HashiCorp)
Rosemary Wang works to bridge the technical and cultural barriers in infrastructure, security, and application development. She has a fascination for solving intractable problems with code as a contributor and educator of open-source projects. When she is not drawing on whiteboards, Rosemary valiantly attempts to hack stacks of various infrastructure systems on her laptop while watering her houseplants.
🔶 Jim Walnum, Ex-Vice President of DevOps (Goldman Sachs)
💕 Cloud-Native @Scale Meetup community 🤗 💕