Digital Workshop Sign Up Page

Digital Workshop

Using Build-in Kubernetes Controls to Secure Your Applications

Date: Thursday, May 28, 2020
Time: 9:30 - 11:30 am PDT | 12:30 - 2:30 pm EDT
(2 hour workshop)

Kubernetes’ default settings do not enable security. Fortunately, Kubernetes has a ton of built-in controls you can tap to improve your security posture. In this hands-on workshop, we will show you how to:

  • Set up read-only root file systems, non-root users, and limited capabilities
  • Define network policies, admission control, and resource limits to enhance security
  • Use Kubernetes namespacing and metadata to limit exposure
  • Apply overall infrastructure security best practices

Minimum requirements

  • Basic level experience with Kubernetes preferred
  • Bring a K8s cluster, either deployed online or running on your computer with a tool like Minikube or Docker for Mac. A single-node cluster will work fine. Make sure you have permission to deploy vulnerable applications into the cluster you plan to use.
  • Make sure the kubectl command line is working and you can successfully run commands like kubectl get ns and kubectl run -- image nginx nginx against your cluster

StackRox is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. You may unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.

By submitting this form, you consent to allow StackRox to store and process the personal information submitted above in order to provide you the content or service requested.

Presented by

Connor Gilbert
Senior Product Manager, StackRox