Tigera Events

AWS Dev Days: Hands-on EKS workshop: Kubernetes configuration security and compliance

Topics:

Security EKS
Americas
March 23, 2023
10:00 am PDT

Happening this week

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • PARTNER

  • TOPIC

The MITRE ATT&CK framework for containers and networks provides common tactics used by attackers to breach containerized applications on Kubernetes. Attend this webinar to learn how Calico’s defense-in-depth approach protects against container and network-based MITRE ATT&CK techniques. In this webinar, you will discover:

  • The cyber kill chain – Timelines and techniques used by adversaries to penetrate an organization’s network
  • How Calico uses Runtime Threat Defense to detect container and network-based malicious activity
  • How to mitigate risks and protect sensitive information from leaving your organization

Register here.

  •  Giri Radhakrishnan

As Kubernetes clusters grow, platform owners want to have visibility into workload-workload communication in the cluster to be able to troubleshoot workload communication breakdown. They also want to know about security policy gaps and applying policies to secure the communication. Using a real-life scenario, in this session we will learn:

  • How to identify security gaps in Kubernetes clusters by observing real-time workload communication
  • How to address the gap by enforcing a security policy

Register here.

  •  Dhiraj Sehgal

Most businesses are subject to corporate and/or regulatory compliance requirements. From an operational perspective, this may involve isolating workloads containing sensitive data or restricting who is allowed to access specific resources. In this session, you will learn how to use Calico’s identity-aware microsegmentation to meet compliance mandates for SOC 2, PCI, HIPAA, etc., in any Kubernetes environment.

  •  Dhiraj Sehgal

Were you aware of the dirty pipe or text4shell vulnerabilities last year? With all the security predictions and trends that are forecast for this year, you can easily get overwhelmed by the need to invest in a broad range of security solutions. It is wise to carefully plan and evaluate which tools to invest in, especially if you are dealing with a new domain such as containers and Kubernetes.

In this webinar we will walk you through the container threat landscape and why there is a need for a new approach to container security.

This webinar will cover topics about:

  • Threat vectors in a modern cloud-native application
  • Challenges that organizations face while securing container workloads
  • Calico as a unified, integrated solution for build, deploy and runtime security
  •  Giri Radhakrishnan

Kubernetes platform teams create and maintain a secure Kubernetes platform so developers can focus on building applications. Calico provides zero-trust security to enable platform engineers to reduce the attack surface of microservices-based applications and mitigate security breaches. In this webinar, you will learn how to use the following Calico features to implement Kubernetes platform security best practices:

  • Unified controls for multi-cluster
  • Workload access controls such as DNS policies and Networksets to limit access to external resources
  • Egress Gateway to extend existing firewalls to Kubernetes
  • Encryption
  • Improving Kubernetes platform configuration with CIS benchmarks
  •  Giri Radhakrishnan

Another release, another milestone. With Calico’s latest release (3.16), we have some exciting announcements for AKS and EKS users. If you are managing Kubernetes clusters on Azure AKS or AWS EKS and wondering how to secure traffic leaving the cluster, join this webinar where we will discuss how teams can:

  • Create a stronger security posture for AKS and EKS container workloads with Calico Enterprise’s egress gateway functionality
  • Handle IP addresses efficiently for networking and security with a fixed, routable IP at the namespace level
  •  Giri Radhakrishnan

In this session, we will briefly go over Kubernetes components and their roles. Then, we will delve into the realm of security and examine how the default configurations of these components could be used to attack your environment and how a zero-trust posture can help against the attacks that are targeting your clusters. By the end of this session, attendees will be able to:

  • Secure Kubernetes components and spot misconfigurations.
  • Learn How to secure your Kubernetes host workloads.
  • Discover how eBPF policies can improve efficiency and security in a cluster.
  •  Reza Ramezanpour

Are you on your cloud-native journey and wondering how organizations have managed to create a secure Kubernetes platform for application workloads? If you are using a managed Kubernetes service such as AKS or EKS, or self-managed platforms such as Red Hat OpenShift or Rancher, and want to know more about workload access controls and other security best practices for zero-trust, attend this webinar. You will learn:

  • Why and how workloads can be secured using Calico security policies
  • How to reduce the overall attack surface with identity-based microsegmentation
  • How observability plays a crucial role for platform, cloud and DevOps teams
  •  Giri Radhakrishnan

Organizations are adopting multi-region databases such as CockroachDB for various reasons, including disaster recovery, regional data protection regulations or latency reduction. Unfortunately, Kubernetes’s single cluster architecture doesn’t scale with multi-region and multi-cluster database deployments. Calico cluster mesh addresses this Kubernetes shortcoming by providing consistent networking and security policies for CockroachDB and similar architecture databases and prevents drift for multi-region CockroachDB in Kubernetes.

Join Cockroach Labs and Calico experts in this webinar to see a working solution to address networking and security across clusters in different regions.

Register here

  •  Joseph Yostos

Over the last several quarters, our research and development team invested time to create a transformational technology that provides comprehensive runtime protection from both network and container threats. This is an operationally simpler approach without the need to write complex security rules, enabling security teams to focus on essential tasks. Join us for this webinar where we unveil Calico Runtime Threat Defense capability, including

  • Our comprehensive runtime protection for container workloads
  • A practical and straightforward solution for detecting container and network-based threats
  • Active risk mitigation to prevent breaches from turning into disasters
  •  Giri Radhakrishnan