Tigera Events

AWS Dev Days: Hands-on workshop: Implementing container security on EKS

Topics:

EKS Security
EMEA
December 15, 2022
10:00 am GMT

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • PARTNER

  • TOPIC

In this EKS-focused security workshop, you will work with AWS Dev Days and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in implementing:

  • Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Evidence and audit reporting

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

    Attend this in-depth, hands-on, AKS-focused security workshop with Microsoft Azure and Calico experts to learn how to prevent, detect, and stop breaches in applications running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:

    • Scan container images and block deployment based on your security criteria during build time
    • Preview and enforce security policies to protect vulnerable workloads
    • Implement zero-trust access controls to prevent egress and lateral movement during runtime
    • Implement runtime security with IDS/IPS, WAF, and malware detection
    • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security

    We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

    Register now to reserve your spot!

      Attend this in-depth, hands-on security workshop with Calico and AWS Dev Days experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. This workshop is designed to provide hands-on experience for you to:

      • View service-to-service communication to assess security risk from external threats
      • Analyze and fix security policy gaps within the cluster
      • Detect and prevent anomalous behaviors such as attempts to access restricted URLs
      • Implement security policies in runtime to mitigate risk based on vulnerabilities found in build time

      We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

      Register now to reserve your spot!

       

        In this EKS-focused security workshop, you will work with Calico and AWS Dev Days experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:

        • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
        • Extend firewall protection at the granular, workload level
        • Block lateral movement of APTs with identity-aware microsegmentation
        • Apply zero-trust security controls at application level

        We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

        Register now to reserve your spot!

          In this AKS-focused security workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in implementing:

          • Kubernetes Security Posture Management (KSPM)
          • Security policies for compliance
          • Evidence and audit reporting

          We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

          Register now to reserve your spot!

            Attend this in-depth, hands-on security workshop with Calico and Microsoft Azure experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. This workshop is designed to provide hands-on experience for you to:

            • View service-to-service communication to assess security risk from external threats
            • Analyze and fix security policy gaps within the cluster
            • Detect and prevent anomalous behaviors such as attempts to access restricted URLs
            • Implement security policies in runtime to mitigate risk based on vulnerabilities found in build time

            We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

            Register now to reserve your spot!

             

              Attend this in-depth, hands-on, EKS-focused security workshop with Amazon and Calico experts to learn how to prevent, detect, and stop application breaches. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:

              • Scan container images and block deployment based on your security criteria during build time
              • Preview and enforce security policies to protect vulnerable workloads
              • Implement zero-trust access controls to prevent egress and lateral movement during runtime
              • Implement runtime security with IDS/IPS, WAF, and malware detection
              • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security

              We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention. Register now to reserve your spot!

                Attend this in-depth, hands-on, EKS-focused security workshop with Amazon and Calico experts to learn how to prevent, detect, and stop application breaches. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:

                • Scan container images and block deployment based on your security criteria during build time
                • Preview and enforce security policies to protect vulnerable workloads
                • Implement zero-trust access controls to prevent egress and lateral movement during runtime
                • Implement runtime security with IDS/IPS, WAF, and malware detection
                • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security

                We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

                 

                  Enterprises developing compliant cloud-native applications have two major needs. First, they need to secure and govern access to containerized workloads and the Kubernetes environment. Second, they need to simplify audit logging and compliance reporting. The Kubernetes environment is dynamic and distributed, and workloads are ephemeral, making it difficult to enforce compliance controls and provide continuous reporting.

                  In this webinar, we will discuss the following measures and recommendations to ensure compliance for containers and Kubernetes:

                  • Isolation of workloads containing sensitive data
                  • Restricting access to specific resources such as databases and 3rd-party services
                  • Simplifying enforcement and audit by tracking all policy changes daily
                  • Providing proof of compliance

                    In this EKS-focused security workshop, you will work with Calico and AWS Dev Days experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:

                    • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
                    • Extend firewall protection at the granular, workload level
                    • Block lateral movement of APTs with identity-aware microsegmentation
                    • Apply zero-trust security controls at application level

                    We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

                    Register now to reserve your spot!