Admission Control: Easily setting policies and guardrails for cluster operations

Presented by

Alfred Trevino - Cloud Technical Marketing Manager, Check Point

About this talk

In this webinar (presented together with CheckMates) we will see how using Kubernetes Admission Control helps customers move govern all cluster operations using a central admissions controller. Easily set policies and guardrails for cluster operations using intuitive, human readable policy language. Enforce least privileged access rights and ensure that all images come from trusted sources. Here’s what we will discuss during this webinar: • Explanation of Admission Control. • Using the intuitive GSL use case builder. • See how CloudGuard identifies Image Assurance. • See how CloudGuard enforces using Admission Control

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (313)
Subscribers (48485)
Check Point Software Technologies Ltd. ( is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.