Kubernetes Security Essentials: Protecting Your Clusters from Threats

On-demand

Kubernetes has become the de facto standard for building and deploying modern applications. However, as teams migrate their projects to Kubernetes, they often overlook critical factors such as deployment environments and technical constraints. During the initial journey into the Kubernetes ecosystem, organizations occasionally neglected essential security principles.

While Kubernetes is a powerful platform, it is crucial to implement the right security best practices to ensure our applications run safely and to prevent hackers from taking control of our clusters.

In this webinar, we will explain the security best practices for deploying applications in a Kubernetes cluster. We will cover the importance of:

  • Implementing robust security procedures when building our code and generating application containers
  • Assigning appropriate privileges to our pods
  • Creating a zero-trust security policy to limit the impact of potential attacks
  • Detecting suspicious events during the runtime of our applications

We will highlight what Dynatrace and Red Hat can do to help customers protect their investment in Kubernetes solutions.

Register now
Speakers
Henrik Rexed
Senior Staff Engineer at Dynatrace
Giri Venkataraman
Associate Principal Solution Architect at Red Hat