Securing the Deployment Pipeline
The course is part of this learning path
This course explores how to secure your deployment pipelines on GCP. We will cover the four main techniques to securely build and deploy containers using Google Cloud and you will follow along with guided demonstrations from Google Cloud Platform so that you get a practical understanding of the techniques covered.
If you have any feedback relating to this course, please contact us at firstname.lastname@example.org.
By completing this course, you will understand:
- The advantages of using Google managed base images
- How to detect security vulnerabilities in containers using Container Analysis
- How to create and enforce GKE deployment policies using Binary Authorization
- How to unauthorized changes to production using IAM
This course is intended for:
- Infrastructure/Release engineers interested in the basics of building a secure CI/CD pipeline in GCP
- Security professionals who want to familiarize themselves with some of the common security tools Google provides for container deployment
- Anyone taking the Google “Professional Cloud DevOps Engineer” certification exam
To get the most out of this course, you should be familiar with:
- Building CI/CD pipelines
- Building containers and deploying them to Kubernetes
- Setting up IAM roles and policies
Welcome to "Securing the Deployment Pipeline on Google Cloud Platform." My name is Daniel Mease and I'll be taking you through this course. I am a GCP instructor at Cloud Academy with over five years of cloud experience and 15 years of software development experience. If you have any questions or concerns about the content of this course, please connect with me on LinkedIn or send an email to email@example.com. If you experience any problems or technical issues, make sure to email firstname.lastname@example.org and one of our cloud experts will get back to you as soon as possible.
If you're looking for some effective ways to securely build and deploy containers using Google Cloud, you've come to the right place. This course will introduce four main techniques. First, using Google managed base images to ensure your containers start out with the latest security fixes. Second, using Container Analysis to detect security issues in your container images. Third, enabling Binary Authorization on your Kubernetes cluster to ensure that only verified code gets deployed. And fourth, limiting user's permissions with Cloud Identity and Access Management to prevent accidental or unauthorized changes to production.
Of course, for any of this to make sense, you need to already understand a few things. In this course, I'm going to assume you are already familiar with building CI/CD pipelines, building containers and deploying them to Kubernetes, and setting up IAM roles and policies This course is really designed to help the following people. First, infrastructure and release engineers interested in the basics of building a secure CI/CD pipeline in GCP. Second, security professionals who want to familiarize themselves with some of the common security tools Google provides for container deployment. And third, anyone taking the Google Professional Cloud DevOps Engineer certification exam. So, if you are still interested in learning how to secure your deployment pipeline, let's get started.
Daniel began his career as a Software Engineer, focusing mostly on web and mobile development. After twenty years of dealing with insufficient training and fragmented documentation, he decided to use his extensive experience to help the next generation of engineers.
Daniel has spent his most recent years designing and running technical classes for both Amazon and Microsoft. Today at Cloud Academy, he is working on building out an extensive Google Cloud training library.
When he isn’t working or tinkering in his home lab, Daniel enjoys BBQing, target shooting, and watching classic movies.