Tigera Events

Amazon EKS Security Bootcamp: Implementing Kubernetes network security for EKS clusters and workload

Topics:

Security EKS
Americas
April 25, 2024
10:00 am PST

Happening this week

  •  Jennifer Luther Thomas

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • PARTNER

  • TOPIC

Join our professional services leader to learn how to engage with a technology partner and ask the right questions to get your cloud-native applications SOC 2 compliant and running regulated workloads. He will share real-world examples and a demo application to walk you through a successful compliance initiative within an organization. You should be able to answer the following questions as you start your compliance project.

  • Step 1 – How to do an inventory check of resources deployed in the cluster?
  • Step 2 – How to map SOC2 compliance requirements to your workloads?
  • Step 3- How to implement security controls and policies?
  • Step 4 – How to turn on continuous compliance?
  • Step 5 – How to be ready for audit reporting?
  •  Dhiraj Sehgal
  •  Kartik Bharath

The healthcare industry is increasingly adopting containers and Kubernetes for their healthcare applications. DevOps, SREs and platform teams need to secure PII and PHI data for HIPAA compliance under privacy rules.

In this webinar, we will walk you through a step-by-step guide to achieving HIPAA compliance, addressing security risks, and meeting audit requirements for containers and Kubernetes, including:

  • How to map HIPAA compliance requirements to your workloads
  • How to implement security controls and policies
  • How to achieve continuous compliance
  • How to prepare for audit reporting

In this AKS-focused workshop, you will work with Microsoft and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned AKS and Calico Cloud environment and is designed to help implement:

  • Configuration security including Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)

You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in AKS, along with best practices that you can implement in your own organization.

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

In this EKS-focused workshop, you will work with AWS and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned EKS and Calico Cloud environment and is designed to help implement:

  • Configuration security including Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)

You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in AWS, along with best practices that you can implement in your own organization.

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

In this RKE-focused workshop, you will work with Suse Rancher and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned RKE and Calico Cloud environment and is designed to help implement:

  • Configuration security including Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)

You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in Suse Rancher, along with best practices that you can implement in your own organization.

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Join our Customer Success Leader to learn how to engage with a technology partner and ask right questions to get your cloud-native applications PCI or SOC2 compliant running regulated workloads. He will share real-world examples and a demo application to walk you through a successful compliance initiative within an organization. You should be able to answer the following questions as you start your compliance project.

  • How to do inventory check of resources deployed in cluster
  • How to map PCI, SOC2 compliance requirements to technology solution deployed
  • How to implement security controls and policies
  • How to turn on continuous compliance
  • How to be ready for audit reporting

Register Now

In this security & compliance webinar, we will outline some best practices to ensure workload compliance for containers is met, while avoiding the usual pitfalls when enforcing labels after the workload is deployed into Kubernetes. This 1 hour webinar will cover the below topics:

  • What are labels? And why should I use them?
  • Commons issues when applying labels as an afterthought
  • Why labels are critical when demonstrating compliance (PCI, SOC2, HIPAA)
  • Using label selectors within security policies to achieve continuous compliance
  • Preventing a zero-day workload attack through a zero-trust label schema

We have limited the number of participants for this webinar to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

In this EKS-focused workshop, you will work with AWS and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned EKS and Calico Cloud environment and is designed to help implement:

  • Configuration security including Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)


You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in AWS, along with best practices that you can implement in your own organization.

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

In this EKS-focused workshop, you will work with AWS and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned EKS and Calico Cloud environment and is designed to help implement:

  • Configuration security including Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)

You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in AWS, along with best practices that you can implement in your own organization.

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

In this AKS-focused workshop, you will work with Microsoft and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks including but not limited to PCI, SOC2 and GDPR. This 90-minute hands-on lab comes with your own provisioned AKS and Calico Cloud environment and is designed to help implement:

  • Configuration security including Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Compliance, evidence, and audit reporting (PCI, SOC 2, and CIS benchmarks)

You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in AKS, along with best practices that you can implement in your own organization.

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!