Tigera Events

Hands-on workshop: Cyber Threat Protection Strategies & Tactics for Kubernetes

Topics:

Security
Americas
September 30, 2021
10:00 am PDT

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • TOPIC

In this EKS-focused workshop for Kubernetes security and observability by AWS and Tigera, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

– Access controls
– DNS policy
– Dynamic Service Graph
– Compliance and reporting
– Observability and troubleshooting

You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS EKS, and with best practices that you can implement in your own organization.

We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

Register now to reserve your spot!

    Due to the ephemeral, dynamic and highly distributed nature of Kubernetes deployments, they are vulnerable to cyber attacks. In this interactive workshop a Kubernetes security expert will help you design how to protect Kubernetes environments from cyber threats. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

    -Egress access controls & DNS policies to prevent unauthorized access
    -Microsegmentation to prevent lateral movement of cyber threats
    -Intrusion detection & prevention tactics

      In this enterprise compliance focussed workshop for Kubernetes, you will work with a Calico subject matter expert to learn how to design, deploy, and observe security and networking policies to ensure compliance in your Kubernetes environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

      – Migrate and apply PCI, SOC2 compliance policies
      – Microsegmentation to prevent lateral movement
      – Intrusion detection & prevention tactics
      – Generate and leverage audit reports showing security rules in place, and demonstrate proof of compliance
      – pre-defined compliance report formats and custom reports to streamline compliance program

      You will come away from this workshop with an understanding of how others in your industry are doing enterprise security and compliance in Kubernetes environment such as AWS EKS, Microsoft AKS, Rancher, Openshift, on-premises or in public cloud.
      We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

      Register now to reserve your spot!

        Due to the ephemeral, dynamic and highly distributed nature of Kubernetes deployments, they are vulnerable to cyber attacks. In this interactive workshop a Kubernetes security expert will help you design how to protect Kubernetes environments from cyber threats. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

        -Egress access controls & DNS policies to prevent unauthorized access
        -Microsegmentation to prevent lateral movement of cyber threats
        -Intrusion detection & prevention tactics

          In this EKS-focused workshop for Kubernetes security and observability by AWS and Tigera, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

          – Access controls
          – DNS policy
          – Dynamic Service Graph
          – Compliance and reporting
          – Observability and troubleshooting

          You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS EKS, and with best practices that you can implement in your own organization.

          We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

          Register now to reserve your spot!

            SOC 2 compliance is a component of the American Institute of CPAs (AICPA)’s Service Organization Control reporting platform, whose goal is to ensure that systems are enabled to support the five trust service principles: security, availability, processing integrity, confidentiality, and privacy of customer data. The SOC 2 auditing procedure is specifically designed for service providers storing customer data in the cloud. That means SOC 2 applies to nearly every SaaS company, as well as any organization that uses the cloud to store its customers’ information. For security-conscious businesses handling sensitive customer data, SOC 2 compliance is a minimal requirement when considering a SaaS provider.

            Whether you are using hosts, VMs, containers or Kubernetes, Calico Enterprise and Calico Cloud can help you achieve granular visibility into your SaaS and cloud environments, address security risks and meet SOC 2 audit requirements.

            In this webinar you will learn:

            – How to establish data management policies and procedures that are based on the five SOC 2 trust service principles
            – How to implement audit and reporting capabilities to meet compliance requirements
            – How to demonstrate security control over the systems and operations associated with your SaaS and cloud environments

              In this EKS-focused workshop for Kubernetes security and observability, you will work with a Calico and AWS expert to learn how to design, deploy, and observe security and networking policies in an EKS environment. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

              – Access controls
              – DNS policy
              – Dynamic Service Graph
              – Compliance and reporting
              – Observability and troubleshooting

              You will come away from this workshop with an understanding of how others in your industry are doing Kubernetes security and observability in AWS EKS, and with best practices that you can implement in your own organization.

              We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

              Register now to reserve your spot!

                Deep dive hands-on workshop with a Calico expert to design and implement Kubernetes observability

                90-mins interactive lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on:

                – Run-time visualization of traffic flow and security policies
                – Service-level observability
                – DNS dashboards
                – Anomaly detection and live troubleshooting on a pod or collection of pods

                You will learn best practices that you can implement, and gain an understanding of how others in your industry are doing Kubernetes observability in AWS, Azure, GCP, and private cloud environments today.

                We have limited the number of participants for this workshop to ensure adequate attention can be given to each participant.

                Register now to reserve your spot!

                  One way Calico is used to secure container workloads in Kubernetes is through Network Policies, which allow you to restrict the flow of traffic to and from trusted sources—but this can leave the traffic itself unprotected. One common solution to this is to encrypt traffic at the application level, but Calico gives you another choice: using Wireguard to encrypt data in transit.

                  In this webinar, we’ll explore the details of how Wireguard works, and the advances it makes over previous kernel VPN technologies. We’ll also look at and how we make use of Wireguard in Calico—what Calico does behind the scenes to set up the encrypted mesh, and how packets flow through the system.

                  Finally, deploying Wireguard with Calico in AKS has a few unique considerations, so we’ll discuss what it takes to enable Wireguard with Calico using Microsoft’s hosted Kubernetes service.

                    Due to the ephemeral, dynamic and highly distributed nature of Kubernetes deployments, they are vulnerable to cyber attacks. In this interactive workshop a Kubernetes security expert will help you design how to protect Kubernetes environments from cyber threats. This 90-minute hands-on lab with your own provisioned Calico Cloud environment is designed to provide more complete knowledge on how to implement:

                    -Egress access controls & DNS policies to prevent unauthorized access
                    -Microsegmentation to prevent lateral movement of cyber threats
                    -Intrusion detection & prevention tactics