Tigera Events

Amazon EKS Security Bootcamp: Implementing zero-trust security for containers

Topics:

Security EKS
Americas
March 28, 2024
10:00 am PST

Happening this week

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • PARTNER

  • TOPIC

Attend this in-depth, hands-on, EKS security workshop with Amazon AWS and Calico experts to learn how to strengthen security posture of your cluster with network based controls running on EKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Get namespace isolation with security policy recommendation
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level
  • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

Attend this in-depth, hands-on, AKS security workshop with Microsoft Azure and Calico experts to learn how to strengthen security posture of your cluster with network based controls running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Get namespace isolation with security policy recommendation
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level
  • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Ivan Sharamok

Event Partner: 

In this AKS-focused security workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to HIPAA, PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in implementing:

  • Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Evidence and audit reporting

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Jeremy Guerrand

Event Partner: 

In this EKS networking workshop, you will work with Amazon AWS and Calico experts to learn how to design, configure, deploy, and secure your Kubernetes network for single and multi-cluster environment across Standard Linux, eBPF, and Windows dataplanes. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in:

  • Networking Options across Linux, eBPF, Windows dataplanes
  • Address IP exhaustion issues and encrypt data-in-transit
  • Author and enforce workload-level network policy

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Regis Martins

Event Partner: 

In this EKS security workshop, you will work with Calico and Amazon AWS experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:

  • Deploy zero-trust workload access controls with namespace isolation recommendations
  • Extend firewall protection at the granular, workload level
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Rui De Abreau

Event Partner: 

In this AKS networking workshop, you will work with Microsoft Azure and Calico experts to learn how to design, configure, deploy, and secure your Kubernetes network for single and multi-cluster environment across Standard Linux, eBPF, and Windows dataplanes. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in:

  • Networking Options across Linux, eBPF, Windows dataplanes
  • Address IP exhaustion issues and encrypt data-in-transit
  • Author and enforce workload-level network policy

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Jennifer Luther Thomas

Event Partner: 

In this EKS security workshop, you will work with Calico and Amazon AWS experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:

  • Deploy zero-trust workload access controls with namespace isolation recommendations
  • Extend firewall protection at the granular, workload level
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Kartik Bharath

Event Partner: 

Attend this in-depth, hands-on security workshop with Calico and Microsoft Azure experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. This workshop is designed to provide hands-on experience for you to:

  • View service-to-service communication to assess security risk from external threats
  • Analyze and fix security policy gaps within the cluster
  • Detect and prevent anomalous behaviors such as attempts to access restricted URLs
  • Implement security policies in runtime to mitigate risk based on vulnerabilities found in build time

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Rui De Abreau

Event Partner: 

In this AKS-focused security workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to HIPAA, PCI, SOC 2, and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in implementing:

  • Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Evidence and audit reporting

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

Attend this in-depth, hands-on security workshop with Calico and Amazon AWS experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. This workshop is designed to provide hands-on experience for you to:

  • View service-to-service communication to assess security risk from external threats
  • Analyze and fix security policy gaps within the cluster
  • Detect and prevent anomalous behaviors such as attempts to access restricted URLs
  • Implement security policies in runtime to mitigate risk based on vulnerabilities found in build time

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Kartik Bharath

Event Partner: