Threat Modeling for Linux Containers (LXC), Docker and the Cloud

Watch Now
Provided by:
Format: Webcast
Traditional threat modeling has utilized data flow diagrams to model the software or system in question. How well does that methodology work for complex and interconnected systems? During 3 years of threat modeling work at Rackspace, the authors have found the limitations of data flow diagrams and other threat modeling methodologies when conducting threat models of OpenStack, Linux containers, Docker and other recent cloud technologies.
Watch Now

Find By Topic