Hardening Your Config Management - Security and Attack Vectors in Config Management

Senior Professional Services Engineer at Puppet
Jan. 31, 2016
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
Hardening Your Config Management - Security and Attack Vectors in Config Management
1 of 131

More Related Content

What's hot

Ephemeral DevOps: Adventures in Managing Short-Lived SystemsEphemeral DevOps: Adventures in Managing Short-Lived Systems
Ephemeral DevOps: Adventures in Managing Short-Lived SystemsPriyanka Aash
Pragmatic Security Automation for CloudPragmatic Security Automation for Cloud
Pragmatic Security Automation for CloudPriyanka Aash
PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...
PuppetConf 2017: Securing Secrets for Puppet, Without Interrupting Flow- Ryan...Puppet
Bünyamin Demir - 10 Adımda Yazılım GüvenliğiBünyamin Demir - 10 Adımda Yazılım Güvenliği
Bünyamin Demir - 10 Adımda Yazılım GüvenliğiCypSec - Siber Güvenlik Konferansı
Kan du få data tilbake igjen fra dine Elasticsearch snapshots?Kan du få data tilbake igjen fra dine Elasticsearch snapshots?
Kan du få data tilbake igjen fra dine Elasticsearch snapshots?Jan Fredrik Wedén
Android Tamer: Virtual Machine for Android (Security) ProfessionalsAndroid Tamer: Virtual Machine for Android (Security) Professionals
Android Tamer: Virtual Machine for Android (Security) ProfessionalsAnant Shrivastava

What's hot(20)

Similar to Hardening Your Config Management - Security and Attack Vectors in Config Management

How to configure esx to pass an auditHow to configure esx to pass an audit
How to configure esx to pass an auditConcentrated Technology
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using AnsibleSonatype
Desktop and Server SecurityDesktop and Server Security
Desktop and Server SecurityAbhinit Kumar Sharma
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
Windows logging cheat sheetWindows logging cheat sheet
Windows logging cheat sheetMichael Gough

More from Peter Souter

Head in the Clouds: Testing Infra as Code - Config Management 2020Head in the Clouds: Testing Infra as Code - Config Management 2020
Head in the Clouds: Testing Infra as Code - Config Management 2020Peter Souter
I don't know what I'm Doing: A newbie guide for Golang for DevOpsI don't know what I'm Doing: A newbie guide for Golang for DevOps
I don't know what I'm Doing: A newbie guide for Golang for DevOpsPeter Souter
Consul Connect - EPAM SEC - 22nd september 2018Consul Connect - EPAM SEC - 22nd september 2018
Consul Connect - EPAM SEC - 22nd september 2018Peter Souter
Monitoring a Vault and Consul cluster - 24th May 2018Monitoring a Vault and Consul cluster - 24th May 2018
Monitoring a Vault and Consul cluster - 24th May 2018Peter Souter
Maintaining Layer 8Maintaining Layer 8
Maintaining Layer 8Peter Souter
Knee deep in the undef  - Tales from refactoring old Puppet codebasesKnee deep in the undef  - Tales from refactoring old Puppet codebases
Knee deep in the undef - Tales from refactoring old Puppet codebasesPeter Souter

Recently uploaded

Data Formats: Reading and writing JSON – XML - YAMLData Formats: Reading and writing JSON – XML - YAML
Data Formats: Reading and writing JSON – XML - YAMLCSUC - Consorci de Serveis Universitaris de Catalunya
The Ultimate Administrator’s Guide to HCL Nomad WebThe Ultimate Administrator’s Guide to HCL Nomad Web
The Ultimate Administrator’s Guide to HCL Nomad Webpanagenda
Scaling out with WordPressScaling out with WordPress
Scaling out with WordPressKonstantin Kovshenin
Enhance Productivity Expert Laptop Support For Modern ProfessionalEnhance Productivity Expert Laptop Support For Modern Professional
Enhance Productivity Expert Laptop Support For Modern ProfessionalIT Services Helps
Unleashing Innovation: IoT Project with MicroPythonUnleashing Innovation: IoT Project with MicroPython
Unleashing Innovation: IoT Project with MicroPythonVubon Roy
Keynote: Two years at the British Library... and counting / Alan Danskin (Bri...Keynote: Two years at the British Library... and counting / Alan Danskin (Bri...
Keynote: Two years at the British Library... and counting / Alan Danskin (Bri...CILIP MDG

Recently uploaded(20)

Hardening Your Config Management - Security and Attack Vectors in Config Management