CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

DevSecOps & Cloud Security Forum
  • May 6th (Thu)
  • 10:45 - 11:15
  • 7F 701G

IaC Security

Chinese Onsite

1.It is more and more important to understand the related security risk and complexity as the penetration rate of IaC raises. 

Currently Infra put a lot of efforts to establish IaC best practices, so it is less to involve IaC security general resource 

and process, especially identity authentication and authorization solution or security risk control of network setting.

So engineers work hard on intrastructure security process to define ideal security strategy in CI/CD fast process.


2.At the same time, IaC security strategy and developer/maintenace personnel would react different warning, and establish 

processing rules to each warning.

Security Architecture Web SecurityDevSecOps
Chang Yu Wu

Chang Yu Wu

MIS Manager of IT department, Rakuya.inc

I work on DevOps and Security implementation to improve workflow.

Our goal is to find a balance between developement and maintenance to lower the security risk and cost, and 

save the time to improve the quality of life.