Kubernetes & Zero Trust Security: Supporting a CARTA Approach

Presented by

Christopher Liljenstolpe, CTO, Solutions, Tigera

About this talk

Learn how to support a continuous adaptive risk and trust assessment (CARTA) approach leveraging accurate Kubernetes flow logs. 5-tuple logging is commonly used to monitor and detect anomalies and produces unreliable data that cannot accurately identify anomalies nor prove enforcement of security policies. Network flow logs include workload identity and other metadata that help continuously monitor activities within Kubernetes clusters.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (36)
Subscribers (3623)
Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to secure containers and applications with a least privileges model and defense in depth. Tigera’s technology is recognized and trusted as the de facto standard for Kubernetes network security.