Implement security best practices to secure your applications, protect your network, manage sensitive data, manage identity and access, and build security controls.
The security pillar defines a zero trust approach and the best practices to protect your applications, protect your, network, manage sensitive data, manage identity and access, and build security controls.
30min
Best practices to protect sensitive data
The security pillar defines best practices to protect your applications, protect your network, manage sensitive data, manage identity and access, and build security controls.
20min
Retrieving CI/CD secrets from Vault
Learn how to securely store and access secrets for your CI/CD pipelines.
15min
Prevent lateral movement
Apply best practices towards prevention of lateral movement
21min
What is zero trust security and zero trust networking?
If you're moving your applications to cloud environments, zero trust security is a critical aspect of cloud security that you must understand.