Kubernetes Security Best Practices for DevOps

Introduction to Amazon EKS Cluster Security On-Demand

Join us for our webinar where we will take a deep-dive into how to implement best-in-class security for your AWS EKS clusters and workloads, including:

  • Using and building secure container images
  • Best practices for AWS VPC design and workload AWS IAM controls
  • Controlling cluster access with authentication and RBAC
  • Network security options and workload security using security policies and namespaces
  • Monitoring cluster security

Speaker: Karen Bruner, Technical Evangelist, StackRox

StackRox is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. You may unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.

By clicking the download now link above, you consent to allow StackRox to store and process the personal information submitted above in order to provide you the content or service requested.