As more companies scale their Kubernetes deployments, they face growing security challenges. With so many options for security, we recently published a blog post to compare and contrast 33 Kubernetes Security tools: https://sysdig.com/blog/33-kubernetes-security-tools/
Read more >
But, there is so much more to share.
Join the author, Mateo Burillo, for this session where he’ll talk through the Kubernetes security best practices and security platforms outlined in his blog post. You’ll walk away with a strong understanding and comparison of security tools in three phases to protect your Kubernetes deployments, so you can choose the right ones for your organization.
--> Phase 1: CI/CD integration (Image scanning, container compliance, CI/CD integration)
--> Phase 2: Deployment security gates (Kubernetes admission webhooks, RBAC, secrets, etc)
--> Phase 3: Runtime security (Container runtime policies, Kubernetes audit log)