Observing and Securing Kubernetes Workloads

SUMMARY
ABOUT THIS
WORKSHOP

In this workshop, you’ll learn to secure Kubernetes clusters by addressing common attack vectors using Cilium, Hubble, and Tetragon, with hands-on sessions covering network and runtime security, requiring only basic Kubernetes knowledge and an interest in cloud-native security.

Kubernetes has become a commodity and companies all around the globe try to catch up and get to production as fast as possible. Meanwhile, security is often overlooked or postponed – sometimes severely threatening the workloads running on top of Kubernetes as a consequence.

In this workshop, we will take a closer look at common attack vectors on Kubernetes and how to avoid or mitigate them from the start.

In particular, we will leverage Cilium, a widely adopted container network interface, and its complementing tools Hubble and Tetragon to secure our clusters’ network and runtime environments.

In bite-sized, hands-on sessions we will go from securing east-west traffic to implementing file access and process lifecycle management.

Suitable for:
Participants need only basic knowledge of Kubernetes and an interest in cloud-native security to follow along.

Language: English

 

(Workshops can be selected during registration process.)

Hosted by:

Daniel

Bodky