Anatomy of a Build Server Attack

Build servers are typically not top-of-the-list for environments that security teams choose to monitor and secure. The perception is that they do not actually hold sensitive data like a production environment would. However, in reality, they have unique access and functionality that makes them a common target for attackers

Threat Stack VP of Product, Chris Ford, will walk through the impact of a build system breach. This example will highlight how the attacker leveraged a build server to wage an insidious attack that has a larger blast radius than a similar attack targeting a production environment directly.

 
Previous Video
Architecting and Securing Cloud Infrastructure
Architecting and Securing Cloud Infrastructure

451 Analyst and Threat Stack VP of Product help organizations understand exactly what they are getting from...

Next Video
How to Achieve SOC 2 Compliance in a Containerized  Environment
How to Achieve SOC 2 Compliance in a Containerized Environment

Watch now to learn more about the complexities of SOC 2 compliance with specific use cases for Docker conta...

Get Access to Threat Stack's Cloud Security Platform

Start Trial