Curriculum: Data Loss Prevention (DLP) in Developer Environments

Subject: Curriculum: Data Loss Prevention (DLP) in Developer Environments

22 chapters

Chapters

  1. 1 Protect Data, Not Tools
    acoustic chicago blues algorave, glitch hop acoustic texas blues, jazz · 3:56
    Learn why traditional data security approaches that block developer tools ultimately fail, and discover how focusing on protecting the actual data rather than restricting access creates more effective and sustainable security solutions. This foundational principle reveals how to maintain both security and developer productivity without compromising either goal.
  2. 2 The Five Security Boundaries
    symphonic boom bap, psychedelic hawaiian, trap k-pop · 3:39
    Learn how five critical security boundaries protect data as it flows from developer devices through production systems, with each layer requiring specific identity verification and access controls to prevent data loss.
  3. 3 Code Flows Outward, Data Stays Inward
    symphonic boom bap, psychedelic hawaiian, trap k-pop · 3:32
    Learn the fundamental principle of secure development workflows where source code flows freely through deployment pipelines while sensitive data like API keys and passwords must remain locked down and protected at every stage.
  4. Source Code Systems
    symphonic boom bap, psychedelic hawaiian, trap k-pop · 3:14
    Learn how source code repositories can become unexpected data leakage points when developers clone complete codebases containing sensitive information hidden in commit histories and configuration files. Discover essential techniques for securing your development workflow while maintaining full access to necessary code resources.
  5. CI/CD Pipelines
    psychedelic cabaret, piano country · 3:47
    Learn how CI/CD pipelines can inadvertently expose sensitive data through automated flows and artifact downloads, and discover essential strategies to secure your development workflows from data leakage vulnerabilities.
  6. Cloud Infrastructure
    symphonic boom bap, psychedelic hawaiian, trap k-pop · 3:52
    Explore how cloud storage systems like S3 can become vulnerability points when developers download sensitive customer data for testing, and learn essential practices for monitoring access logs and maintaining data security boundaries.
  7. Developer Machines
    psychedelic cabaret, piano country · 3:33
    Learn how developer workstations become unexpected sources of data breaches through debug logs, test datasets, and coding practices that inadvertently expose sensitive information like personal details and payment data.
  8. Collaboration Tools
    electronic disco, classical dirty south, city pop classical · 4:06
    Learn how collaboration platforms like Slack can become unexpected data leak sources when developers carelessly share source code containing sensitive information through chat channels and file uploads.
  9. Observability Systems
    psychedelic cabaret, piano country · 4:03
    Learn how observability systems track data movement through complex environments by monitoring logs, traces, and data paths to prevent sensitive information loss before it occurs.
  10. 1 Identity Security
    tokyo city pop, russian grunge · 3:48
    Explore the critical role of identity verification in developer environments, learning how leading platforms like Okta, Azure Entra, and Google Identity create secure authentication gateways. Discover the foundational security measures that protect company data by ensuring only verified users gain access to development systems.
  11. 2 Repository Security
    electronic disco, classical dirty south, city pop classical · 3:49
    Learn how to secure your code repositories through protected branches, pull request workflows, and preventing secret leaks in platforms like GitHub and GitLab. Discover essential security controls that keep your development environment safe from unauthorized changes and data breaches.
  12. 3 CI/CD Controls
    acoustic chicago blues algorave, glitch hop acoustic texas blues, jazz · 4:34
    Learn essential CI/CD pipeline security controls that prevent sensitive data from leaking during automated development workflows across popular platforms like GitHub Actions, GitLab, and Jenkins. Discover how to implement proper safeguards that allow code to flow smoothly while keeping confidential information protected throughout the deployment process.
  13. 4 Cloud Infrastructure Controls
    dreamy shoegaze, liquid drum and bass · 4:48
    Learn how to implement four essential cloud infrastructure controls across AWS, Azure, and Google Cloud Platform, starting with identity and access management to protect your data from unauthorized access. Master the fundamental security practices that keep sensitive information safe while building in cloud environments.
  14. 5 Production Data Protection
    psychedelic cabaret, piano country · 3:41
    Learn how to safeguard sensitive production data through database audit logging, access controls, and defensive strategies that track every developer query and interaction. Discover the essential security measures that protect real-world data from unauthorized exposure while maintaining development workflow efficiency.
  15. Local Development (Low Security)
    psychedelic cabaret, piano country · 3:47
    Developers gain maximum coding freedom in low-security local environments, but this unrestricted access creates hidden risks as sensitive data spreads across development machines without proper safeguards.
  16. Managed Devices
    tokyo city pop, russian grunge · 3:11
    Learn how managed device tools like Jamf, Microsoft Intune, and Kandji serve as essential guardians for protecting sensitive data in developer environments. Discover the three key solutions that help organizations maintain security control while allowing code to flow freely across Apple and other managed devices.
  17. Remote Development Environments
    electronic disco, classical dirty south, city pop classical · 3:16
    Discover how remote development environments like Citrix and Codespaces keep sensitive code and data secure in the cloud while enabling flexible work-from-home development. Learn why moving from local machines to cloud-based development platforms is essential for preventing data loss and maintaining visibility over your organization's intellectual property.
  18. Ephemeral Workspaces
    psychedelic cabaret, piano country · 3:54
    Explore how ephemeral workspaces and zero trust access models protect sensitive code and data in modern development environments where temporary, disposable containers replace traditional local development setups.
  19. Endpoint DLP
    psychedelic cabaret, piano country · 3:41
    Learn how endpoint DLP solutions protect sensitive data from leaking through developer workstations, USB ports, clipboards, and other exit points in your coding environment. Discover essential strategies to prevent data loss at the source where developers handle personal information and secrets daily.
  20. SaaS DLP
    acoustic chicago blues algorave, glitch hop acoustic texas blues, jazz · 3:54
    Explore how organizations protect sensitive data in cloud-based Software-as-a-Service environments, learning about shadow IT risks and the leading DLP solutions that monitor and secure data flows across unsanctioned applications.
  21. Email DLP
    psychedelic cabaret, piano country · 3:52
    Learn how email data loss prevention systems act as digital guardians, automatically scanning outbound messages to detect and block sensitive information like social security numbers and client data before they can be accidentally sent outside your organization.
  22. Cloud Data Protection
    dreamy shoegaze, liquid drum and bass · 4:02
    Explore essential cloud security strategies and discover three fundamental tools that safeguard sensitive information like credit cards and personal data from cyber threats in distributed computing environments.