Threat Modeling for Linux Containers (LXC), Docker and the Cloud

Traditional threat modeling has utilized data flow diagrams to model the software or system in question. How well does that methodology work for complex and interconnected systems? During 3 years of threat modeling work at Rackspace, the authors have found the limitations of data flow diagrams and other threat modeling methodologies when conducting threat models of OpenStack, Linux containers, Docker and other recent cloud technologies.

Provided by: SecurityTube.net Topic: Date Added: Oct 2013 Format: Webcast

Find By Topic