Tigera Events

AWS Dev Days: Hands-on EKS workshop: Kubernetes configuration security and compliance

Topics:

Security EKS
Americas
March 23, 2023
10:00 am PDT

Happening this week

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • PARTNER

  • TOPIC

In this AKS-focused security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Extend firewall protection at the granular, workload level
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

In this AKS-focused security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Extend firewall protection at the granular, workload level
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: 

Attend this in-depth, hands-on security workshop with Calico and AWS experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. This workshop is designed to provide hands-on experience for you to:

  • View service-to-service communication to assess security risk from external threats
  • Analyze and fix security policy gaps within the cluster
  • Detect and prevent anomalous behaviors such as attempts to access restricted URLs
  • Implement security policies in runtime to mitigate risk based on vulnerabilities found in build time

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Chris Man

Event Partner: 

In this AKS-focused security workshop, you will work with Microsoft Azure and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment. The workshop will guide you in implementing:

  • Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Evidence and audit reporting

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Regis Martins

Event Partner: 

Attend this in-depth, hands-on, EKS-focused security workshop with AWS and Calico experts to learn how to prevent, detect, and stop breaches in applications running on EKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:

  • Scan container images and block deployment based on your security criteria during build time
  • Preview and enforce security policies to protect vulnerable workloads
  • Implement zero-trust access controls to prevent egress and lateral movement during runtime
  • Implement runtime security with IDS/IPS, WAF, and malware detection
  • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Jeremy Guerrand

Event Partner: 

The MITRE ATT&CK framework for containers and networks provides common tactics used by attackers to breach containerized applications on Kubernetes. Attend this webinar to learn how Calico’s defense-in-depth approach protects against container and network-based MITRE ATT&CK techniques. In this webinar, you will discover:

  • The cyber kill chain – Timelines and techniques used by adversaries to penetrate an organization’s network
  • How Calico uses Runtime Threat Defense to detect container and network-based malicious activity
  • How to mitigate risks and protect sensitive information from leaving your organization

Register here.

  •  Giri Radhakrishnan

Attend this in-depth, hands-on security workshop with Calico and AWS experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. This workshop is designed to provide hands-on experience for you to:

  • View service-to-service communication to assess security risk from external threats
  • Analyze and fix security policy gaps within the cluster
  • Detect and prevent anomalous behaviors such as attempts to access restricted URLs
  • Implement security policies in runtime to mitigate risk based on vulnerabilities found in build time

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Jonathan Sabo

Event Partner: 

As Kubernetes clusters grow, platform owners want to have visibility into workload-workload communication in the cluster to be able to troubleshoot workload communication breakdown. They also want to know about security policy gaps and applying policies to secure the communication. Using a real-life scenario, in this session we will learn:

  • How to identify security gaps in Kubernetes clusters by observing real-time workload communication
  • How to address the gap by enforcing a security policy

Register here.

  •  Dhiraj Sehgal

In this AKS-focused security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment. The workshop will guide you in implementing:

 

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Extend firewall protection at the granular, workload level
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level


We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

  •  Ivan Sharamok

Event Partner: 

Attend this in-depth, hands-on, AKS-focused security workshop with Microsoft Azure and Calico experts to learn how to prevent, detect, and stop breaches in applications running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application. You will leave this workshop with hands-on experience on how to:

  • Scan container images and block deployment based on your security criteria during build time
  • Preview and enforce security policies to protect vulnerable workloads
  • Implement zero-trust access controls to prevent egress and lateral movement during runtime
  • Implement runtime security with IDS/IPS, WAF, and malware detection
  • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security


We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

Register now to reserve your spot!

Event Partner: