OPERATING SYSTEMSOS Linux

Kubernetes Security 101: Best Practices to Secure your Cluster

This presentation aims to give an overview about how Kubernetes – an orchestration tool for scalable container deployment and management – works and to provide the best practices users can follow to secure their cluster when deploying and maintaining a cluster on their own or via managed services on Cloud Service Providers such as Google, AWS and Azure.

This session will cover everything from the Master Node, starting with the Kube API server, also including the etcd, Role Based Access Control and Network Policies, and then the Worker Nodes, covering the kubelet, how to enable audit logs and how to protect your pods. CIS Benchmarks for Kubernetes and the default security configurations will also be discussed.

Featured Speakers include:
1. Magno Logan, Information Security Specialist at Trend Micro Canada.

source

by Trend Micro AMEA

linux foundation

Leave a Reply

Your email address will not be published. Required fields are marked *