How to achieve SOC 2 in a container environment

How to achieve SOC 2 in a container environment

HomeTechstrong TVHow to achieve SOC 2 in a container environment
How to achieve SOC 2 in a container environment
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
Containers are the hottest open source technology available to developers today. But while containers are becoming more widely adopted, IT compliance remains relatively static—traditional regulations are lagging behind modern systems. So how are other companies addressing compliance today?
In this webinar, the Director of Global InfoSec at ActiveCampaign explains his approach to achieving SOC 2 Type 2 compliance in their heavily containerized environment. In this webinar, Chaim Mazal explains the complexities of SOC 2 compliance using specific use cases for Docker containers, including:
Building a cloud infrastructure to meet compliance requirements
Reporting on SOC 2 controls in a container environment
Discussions with auditors about abstracted cloud infrastructures

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.