Tigera Events

Microsoft AKS on Windows Server/Azure Stack HCI: Hands-on Workshop – Robust Security for Containerized Workloads

Topics:

Security
Americas
June 7, 2022
10:00 am PDT

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • TOPIC

Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security, zero-trust workload security, and advanced troubleshooting for your containerized workloads. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on:

  • Reducing attack surface with Zero-trust workload access
  • Implementing Identity-aware microsegmentation for workloads
  • Runtime visualization, anomaly detection, and live troubleshooting of microservices

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

    In this RKE-focused workshop, you will work with Suse Rancher and Calico expert to learn how to implement Zero-Trust security for workloads running on an RKE environment. This 90-minute hands-on lab comes with your own Calico Cloud environment. Join us to learn how to:

    • Deploy Zero-trust workload access controls (Includes DNS as policy, Egress Gateway, Firewall Integration)
    • Extend Firewall Protection at the granular workload level
    • Block lateral movement of APTs with identity-aware microsegmentation
    • Enable Envoy-based Zero-Trust security controls at the service level
    • Achieve continuous compliance

    We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

    Register now to reserve your spot!

      Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security, zero-trust workload security, and advanced troubleshooting for your containerized workloads. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on:

      • Reducing attack surface with Zero-trust workload access
      • Implementing Identity-aware microsegmentation for workloads
      • Runtime visualization, anomaly detection, and live troubleshooting of microservices

      We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

      Register now to reserve your spot!

        In this RKE-focused workshop, you will work with Suse Rancher and Calico expert to learn how to implement Zero-Trust security for workloads running on an RKE environment. This 90-minute hands-on lab comes with your own Calico Cloud environment. Join us to learn how to:

        • Deploy Zero-trust workload access controls (Includes DNS as policy, Egress Gateway, Firewall Integration)
        • Extend Firewall Protection at the granular workload level
        • Block lateral movement of APTs with identity-aware microsegmentation
        • Enable Envoy-based Zero-Trust security controls at the service level
        • Achieve continuous compliance

        We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

        Register now to reserve your spot!

          In this AKS-focused workshop, you will work with Microsoft and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned AKS and Calico Cloud environment and is designed to help implement:

          • Configuration security including Kubernetes Security Posture Management (KSPM)
          • Security policies for compliance
          • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)

          You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in AKS, along with best practices that you can implement in your own organization.

          We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

          Register now to reserve your spot!

            Layer 7 refers to the top layer in the 7-layer OSI Model of the Internet. It is also known as the “application layer.” It’s the top layer of the data processing that occurs just below the surface or behind the scenes of the software applications that users interact with. The HTTP requests and responses used to load webpages, for example, are layer 7 events.

            DDoS attacks that take place at this level are known as layer 7 attacks or application layer attacks. Given that attacks on apps are the leading cause of breaches, you need to protect the HTTP traffic that provides a gateway to valuable app data. In this webinar, you will learn how protect web applications from a variety of application layer attacks such as cross-site scripting (XSS), SQL injection, and cookie poisoning, among others.

            Topics Include:

            • Enabling L7 logging to capture application interactions from HTTP header data in requests with greater specificity than flow logs
            • Using Dynamic Service Graph to aggregate L7 log data and show what is actually sent in communications between your pods
            • Creating WAF rules to selectively run service traffic within your cluster, and protect intra-cluster traffic from common HTTP-layer attacks
            • Setting globalAlerts templates to notify your security teams when there is a blocked HTTP requests in your log data
            • To increase protection, you can configure security policies to enforce zero-trust controls for selected pods on the host.

              In this EKS-focused workshop, you will work with AWS and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned EKS and Calico Cloud environment and is designed to help implement:

              • Configuration security including Kubernetes Security Posture Management (KSPM)
              • Security policies for compliance
              • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)

              You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in AWS, along with best practices that you can implement in your own organization.

              We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

              Register now to reserve your spot!

                Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security, zero-trust workload security, and advanced troubleshooting for your containerized workloads. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on:

                • Reducing attack surface with Zero-trust workload access
                • Implementing Identity-aware microsegmentation for workloads
                • Runtime visualization, anomaly detection, and live troubleshooting of microservices

                We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

                Register now to reserve your spot!


                  According to the NSA, misconfiguration is the most common cloud security vulnerability. Misconfigurations of environments and images are one of the top concerns for security and DevOps teams. Cloud-native misconfigurations occur when resources have not been configured properly, versions are mismatched, tech stack is not updated leaving your application vulnerable to attack. Simply knowing what configuration requires security teams attention can help mitigate threats.

                  In this webinar, you will learn how to address, audit and actively mitigate security risks based on misconfigurations.

                    In this RKE-focused workshop, you will work with Suse Rancher and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned RKE and Calico Cloud environment and is designed to help implement:

                    • Configuration security including Kubernetes Security Posture Management (KSPM)
                    • Security policies for compliance
                    • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)

                    You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in Suse Rancher, along with best practices that you can implement in your own organization.

                    We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

                    Register now to reserve your spot!