Tigera Events

AWS Dev Days: Hands-on workshop Implementing Container Security on EKS

Topics:

EKS Security
Americas
August 11, 2022
10:00 am PDT

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • PARTNER

  • TOPIC

Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security and zero-trust workload security for your containerized workloads running in self-managed Kubernetes on Amazon Web Service (AWS). The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on:

• Reducing attack surface with Zero-trust workload access
• Implementing Identity-aware microsegmentation for workloads
• Runtime visualization, anomaly detection, and live troubleshooting of microservices
• Detecting and managing vulnerabilities during build and runtime

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

    In this AKS-focused workshop, you will work with a Calico and Microsoft Azure expert to learn how to implement Zero-Trust security for workloads running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment.

    Join us to learn how to:

    • Deploy Zero-trust workload access controls (Includes DNS as policy, Egress Gateway, Firewall Integration)
    • Extend Firewall Protection at the granular workload level
    • Block lateral movement of APTs with identity-aware microsegmentation
    • Enable Envoy-based Zero-Trust security controls at the service level
    • Achieve continuous compliance

    We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

    Register now to reserve your spot!

      In this RKE-focused workshop, you will work with a Calico and Suse Rancher expert to learn how to implement Zero-Trust security for workloads running on RKE. This 90-minute hands-on lab comes with your own Calico Cloud environment. Join us to learn how to:

      • Deploy Zero-trust workload access controls (Includes DNS as policy, Egress Gateway, Firewall Integration)
      • Extend Firewall Protection at the granular workload level
      • Block lateral movement of APTs with identity-aware microsegmentation
      • Enable Envoy-based Zero-Trust security controls at the service level
      • Achieve continuous compliance

      We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

      Register now to reserve your spot!

        In this AKS-focused workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment and is designed to help implement:

        • Configuration security including Kubernetes Security Posture Management (KSPM)
        • Security policies for compliance
        • Compliance, evidence, and audit reporting

        You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in [_____], along with best practices that you can implement in your own organization.

        We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

        Register now to reserve your spot!

          Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security and zero-trust workload security for your containerized workloads running in self-managed Kubernetes on Amazon Web Service (AWS), Microsoft Azure, Red Hat Openshift or SUSE Rancher RKE. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on:

          • Reducing attack surface with Zero-trust workload access
          • Implementing Identity-aware microsegmentation for workloads
          • Runtime visualization, anomaly detection, and live troubleshooting of microservices
          • Detecting and managing vulnerabilities during build and runtime

          We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

          Register now to reserve your spot!

            In this EKS-focused workshop, you will work with Calico and AWS Dev Days experts to learn how to implement Zero-Trust security for workloads running on Amazon Web Service (AWS). This 90-minute hands-on lab comes with your own Calico Cloud environment. Join us to learn how to:

            • Deploy Zero-trust workload access controls (Includes DNS as policy, Egress Gateway, Firewall Integration)
            • Extend Firewall Protection at the granular workload level
            • Block lateral movement of APTs with identity-aware microsegmentation
            • Enable Envoy-based Zero-Trust security controls at the service level
            • Achieve continuous compliance

            We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

            Register now to reserve your spot!

              As enterprises adopt containers and Kubernetes, the growing complexity of workload-to-workload communication along with rapid delivery of applications requires a new approach to visibility when it comes to securing Kubernetes clusters. Service breakdown, performance hotspots, security policy violations and gaps, along with faster troubleshooting and time to resolution, require a Kubernetes-centric approach.

              In this webinar, we discuss how Calico Cloud can help you with the following:

              • Speed up problem identification with a live view of communication between namespaces, microservices, and deployments.
              • Take corrective actions such as implementing security policy based on real-time views of a cluster
              • Use Dynamic Packet Capture for live troubleshooting of service-to-service connectivity issues
              • Deploy corrective action based on the root cause analysis

                In this AKS-focused workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment and is designed to help implement:

                • Configuration security including Kubernetes Security Posture Management (KSPM)
                • Security policies for compliance
                • Compliance, evidence, and audit reporting

                You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in Microsoft Azure, along with best practices that you can implement in your own organization.

                We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

                Register now to reserve your spot!

                  Attend this in-depth, hands-on workshop with a Calico expert to design and implement container security and zero-trust workload security for your containerized workloads running in self-managed Kubernetes on Amazon Web Service (AWS). The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and is designed to provide more complete knowledge on:

                  • Reducing attack surface with Zero-trust workload access
                  • Implementing Identity-aware microsegmentation for workloads
                  • Runtime visualization, anomaly detection, and live troubleshooting of microservices
                  • Detecting and managing vulnerabilities during build and runtime

                  We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

                  Register now to reserve your spot!

                    In order to scale their cloud-native applications and make them feature-rich, organizations are using multiple clouds, each for the different services (e.g. ML, database, compute, etc.) offered. Because different cloud providers offer different services, it’s difficult to use only a single distro or cloud. This creates an ordeal for platform and DevOps teams, which need to manage separate security and observability solutions for each cloud provider. Calico simplifies the challenge by providing a single, unified solution that enables the use of federated resources (policies, identity and service).

                    In this talk, we will break down the complexity of a multi-cluster Kubernetes deployment and look at:

                    • An introduction to multi-cluster architectures
                    • Unified controls for multi-cluster deployments with Calico
                    • Implementing security policies across multiple clusters
                    • Extending the standard Kubernetes service functionality across clusters