Ep 8 - Securing Apps Starts with Securing Kubernetes

Logo
Presented by

Mark Boddington Solutions Architect and Philippe Cloup Senior Solutions Architect

About this talk

When an application enters production as a container, it arrives as a changeless artifact. The first few moments of its existence are spent communicating and learning through the platform API, DNS services, settings, and volumes. The question is, at what stage was the application most vulnerable and when was it compromised? In this session you will learn more about emerging attack vectors targeted at applications deployed inside Kubernetes platforms, and how you can protect both the application and Kubernetes from being compromised. Discover how to: • Monitor your Kubernetes platform for risky behaviours and signs of compromise • Secure the API with Kubernetes Role-Based Access Control (RBAC) • Protect the runtime with Kubernetes security policies • Use ingress controllers to enhance data plane security • Leverage network policies and service mesh to protect and restrict internal traffic By watching this lightboard session, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (158)
Subscribers (23858)
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats.