Liz Rice – The State of Kubernetes Security

Liz Rice – The State of Kubernetes Security

43m

Kubernetes has improved its security posture significantly over the last couple of years — gone are the days when the default settings could leave your cluster open to the internet, thankfully! But does that mean you can fire up a Kubernetes cluster and forget all about security? Liz reviews what you do and don’t need to worry about when running your cloud native applications.

0
Share some ❤
Guest(s): Liz Rice
Date: October 1, 2020
Play
My List

2020 Kubernetes Virtual Summit

Live Hacking! Practical security examples for AWS EKS/Fargate using Falco

Live Hacking! Practical security examples for AWS EKS/Fargate using Falco

Building Sustainable Ecosystems for Cloud Native Software

Building Sustainable Ecosystems for Cloud Native Software

Live Chat Session with AWS Container Experts

Live Chat Session with AWS Container Experts

Nico Kabar - Declarative Network Security for Kubernetes with Calico

Nico Kabar - Declarative Network Security for Kubernetes with Calico

James Strachan - Using Jenkins, Jenkins X and Tekton with GitOps

James Strachan - Using Jenkins, Jenkins X and Tekton with GitOps

Ashley Ward - Kubernetes Security - Defence in Depth

Ashley Ward - Kubernetes Security - Defence in Depth

Cornelia Davis - The Business Benefits of GitOps

Cornelia Davis - The Business Benefits of GitOps

Tim Hockin - Operationalizing Kubernetes: Interview with Tim Hockin

Tim Hockin - Operationalizing Kubernetes: Interview with Tim Hockin

Tracy Ragan - Achieving Business Agility with Microservices

Tracy Ragan - Achieving Business Agility with Microservices

Rob Hirschfeld - Taking Kubernetes to the Edge: RPi + IaC + K3s = EdgeLab.Digital

Rob Hirschfeld - Taking Kubernetes to the Edge: RPi + IaC + K3s = EdgeLab.Digital

Bruno Andrade - Delivering Kubernetes without Thinking of Kubernetes

Bruno Andrade - Delivering Kubernetes without Thinking of Kubernetes

Mike Metral - Infrastructure as Code with Kubernetes Operators

Mike Metral - Infrastructure as Code with Kubernetes Operators

Kevin Downs - Observability for Kubernetes: Simplifying Complex Environments

Kevin Downs - Observability for Kubernetes: Simplifying Complex Environments

Pankaj Gupta - Everything you Wanted to Know about Proxy Architectures: From Simple 2 Tier Ingress to Feature-rich Service Mesh

Pankaj Gupta - Everything you Wanted to Know about Proxy Architectures: From Simple 2 Tier Ingress to Feature-rich Service Mesh

Adam Johnson - Whose Fault Is It When Kubernetes Breaks?

Adam Johnson - Whose Fault Is It When Kubernetes Breaks?

Tracy Miranda - Advancing the Future of CI/CD Together

Tracy Miranda - Advancing the Future of CI/CD Together

Gadi Naor - Cloud Native Security For Kubernetes In Practice

Gadi Naor - Cloud Native Security For Kubernetes In Practice

Chris Gaun - Advanced Kubernetes Management

Chris Gaun - Advanced Kubernetes Management

Jeff Martin - How to Achieve Continuous Container Security in 4 Steps

Jeff Martin - How to Achieve Continuous Container Security in 4 Steps

Andy Suderman - Play SuperTuxKart on Kubernetes!

Andy Suderman - Play SuperTuxKart on Kubernetes!

Bob Reselman - Conway's Law: The Hidden Secret for a Successful Digital Transformation

Bob Reselman - Conway's Law: The Hidden Secret for a Successful Digital Transformation

Carolyn Van Slyck - The Devil is in the Deployments

Carolyn Van Slyck - The Devil is in the Deployments

Jessica Deen - DevOps, Waffles, and Superheroes - Oh my!

Jessica Deen - DevOps, Waffles, and Superheroes - Oh my!

Ian Heritage - Cloud Native Everywhere and Security to Match

Ian Heritage - Cloud Native Everywhere and Security to Match

Leave Review

Your email address will not be published. Required fields are marked *

ARE YOU IN?

Get enhanced value from the site through the exclusive “members-only” content. 200,000+ subscribers already enjoy our premium stuff.