- 1. Introduction & learning outcomes
- 2. Core concepts and vocabulary
- 3. CI/CD as an attack surface: threat models
- 4. Secret types, classification and sensitivity
- 5. Principles for secure secrets management
- 6. Architectural patterns for secrets in CI/CD
- 7. Authentication & identity for pipelines
- 8. Secret injection patterns and runtime handling
- 9. Secret lifecycle: generation, rotation, revocation, archival
- 10. Logging, telemetry, and leakage risks
- 11. Governance, policy, and compliance considerations
- 12. Supply‑chain risks & third‑party components
- 13. Recommended readings and standards
- 1. Introduction
- 2. Core concepts
- 3. Container fundamentals and the attack surface
- 4. Image supply chain: building secure container images
- 5. Registry security and artifact provenance
- 6. Orchestration security
- 7. Runtime container security and hardening
- 8. Networking and microsegmentation
- 9. Storage, volumes, and data protection
- 10. Identity, authentication, and authorization in cloud-native environments
- 11. Cloud provider security models and shared responsibility
- 12. Infrastructure as Code (IaC) security
- 13. Observability: logging, metrics, tracing and detection
- 14. Incident response and forensics in container/cloud environments
- Threat Modeling And Reporting
- Deliverables (what “done” looks like)
- Cheat sheets you’ll keep
- Tips
- Templates
- Hands-On Labs