7 Steps to Secure Your Kubernetes Cluster

Logo
Presented by

Pavel Chistikov, Project Leader, Kasten by Veeam

About this talk

Potential attackers and cybercriminals have a multitude of points through which they can enter and disrupt business operations via your container-based environments: they can infiltrate the application itself, Kubernetes (K8s) cluster, or nodes. Given this multi-faceted attack surface, it’s important to introduce security at every layer of K8s operations to stop hackers, and subsequent data compromise, in their tracks. Discover the 7 keys to K8s security success by tuning into this discussion, which also includes an overview of K8s security layers and principles: 1. Use authentication & authorization controllers 2. Restrict external access to K8s components 3. Encrypt traffic & data 4. And 3 more. Watch the webinar to unlock the remaining 3 takeaways and view a detailed walkthrough of all 7 must-haves from our experts.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (48)
Subscribers (9733)
Purpose-built for Kubernetes, Kasten K10 by Veeam is a scalable and secure solution for application backup, disaster recovery, and mobility. The solution automatically and seamlessly discovers complex Kubernetes applications and all related dependencies, and uses automation with dynamic policies to ensure reliable, secure backup, even as your application changes and scales.