When an application enters production as a container, it arrives as a changeless artifact. The first few moments of its existence are spent communicating and learning through the platform API, DNS services, settings, and volumes. The question is, at what stage was the application most vulnerable and when was it compromised?
In this session you will learn more about emerging attack vectors targeted at applications deployed inside Kubernetes platforms, and how you can protect both the application and Kubernetes from being compromised. Discover how to:
• Monitor your Kubernetes platform for risky behaviours and signs of compromise
• Secure the API with Kubernetes Role-Based Access Control (RBAC)
• Protect the runtime with Kubernetes security policies
• Use ingress controllers to enhance data plane security
• Leverage network policies and service mesh to protect and restrict internal traffic
By watching this lightboard session, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time