Kubernetes Security 101: Best Practices to Secure your Cluster
This presentation aims to give an overview about how Kubernetes – an orchestration tool for scalable container deployment and management – works and to provide the best practices users can follow to secure their cluster when deploying and maintaining a cluster on their own or via managed services on Cloud Service Providers such as Google, AWS and Azure.
This session will cover everything from the Master Node, starting with the Kube API server, also including the etcd, Role Based Access Control and Network Policies, and then the Worker Nodes, covering the kubelet, how to enable audit logs and how to protect your pods. CIS Benchmarks for Kubernetes and the default security configurations will also be discussed.
Featured Speakers include:
1. Magno Logan, Information Security Specialist at Trend Micro Canada.
by Trend Micro AMEA
linux foundation