Journey to Kubernetes Security

Cover Photo

Mar

31

4:30pm

Journey to Kubernetes Security

By IBM Developer

🌟 What you will learn
In recent years, enterprises and developers have started adopting the idea of application modernization by migrating their apps to cloud, applying containerization, using a serverless architecture, and — most importantly — breaking down their monolithic applications into microservices.
Kubernetes plays an important role in this adoption because of the advantages it offers: running and coordinating containerized services across a cluster of machines.
But as we move into this Kubernetes world, there is one thing we need to be careful of - security.
Did you know that there are multiple attack vectors to a microservice architecture deployed using Kubernetes? Such as insecure pod to pod communication. If not encrypted properly, an attacker can get access to confidential information as the communication between different services happens over a network.
In this session, we are going to discuss a few security controls that we can use for our Kubernetes architecture including container image security, nodes security, container runtime security and using Istio for secure communication.
⚠️ Pre-requisites
  • A free IBM Cloud Account: http://ibm.biz/kubernetes_security_webinar
  • Basic to intermediate knowledge of Kubernetes
🎙 Speaker
Chandni Vaya, IBM Developer Advocate, https://www.linkedin.com/in/chandni-vaya-519a05137/

hosted by

IBM Developer

IBM Developer

share

Open in Android app

for a better experience