Securing Apps Starts with Securing Kubernetes

Logo
Presented by

Mark Boddington Solutions Architect and Philippe Cloup Senior Solutions Architect

About this talk

When an application enters production as a container, it arrives as a changeless artifact. The first few moments of its existence are spent communicating and learning through the platform API, DNS services, settings, and volumes. The question is, at what stage was the application most vulnerable and when was it compromised? In this session you will learn more about emerging attack vectors targeted at applications deployed inside Kubernetes platforms, and how you can protect both the application and Kubernetes from being compromised. Discover how to: • Monitor your Kubernetes platform for risky behaviours and signs of compromise • Secure the API with Kubernetes Role-Based Access Control (RBAC) • Protect the runtime with Kubernetes security policies • Use ingress controllers to enhance data plane security • Leverage network policies and service mesh to protect and restrict internal traffic By watching this lightboard session, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time

Related topics:

More from this channel

Upcoming talks (14)
On-demand talks (219)
Subscribers (17179)
F5 application services ensure that applications are always secure and perform the way they should—in any environment and on any device. F5 EMEA hosts webinar series on the latest IT industry trends around app services and security, so please stay tuned to this channel to get the latest information. To learn more about F5, visit f5.com or follow @F5_EMEA on Twitter.