Kubernetes Security Best Practices for DevOps

[On-Demand] Kubernetes Security — 10 Things You Should Be Doing

Kubernetes has empowered organizations to build, deploy, and scale applications faster and more efficiently. However, if you are not actively addressing the security challenges in your Kubernetes environments, you are putting your business critical applications at risk. Whether you’re using a cloud provider’s managed Kubernetes service (EKS, AKS, GKE), a Kubernetes distribution (Red Hat OpenShift), or self-managing your clusters, you must protect your containerized applications throughout the application life cycle.

Join StackRox’s Karen Bruner, technical evangelist, and CCSI’s Joe Goldberg, sr. cloud and infrastructure practice manager, for this on-demand session to learn about best practices you should implement as part of your Kubernetes security initiative.

Topics include:

  • building secure images
  • designing secure Kubernetes clusters
  • implementing secure network segmentation
  • protecting containerized workloads at runtime

Speaker: Joe Goldberg, Sr. Cloud Program Manager, Contemporary Computer Services Inc. (CCSI)

CCSI-white.png

StackRox is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. You may unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.

By clicking the download now link above, you consent to allow StackRox to store and process the personal information submitted above in order to provide you the content or service requested.