Kubernetes Security Webishop

December 2020

Summary

Lightspin webishop is a unique format of half webinar-half workshop. In this webishop we will dive into security concepts in Kubernetes, including:

What do you think of when you hear Kubernetes in cloud security? Native load balancing, dynamic scaling, self-healing and rollback capabilities…? Us too! These are just some of our favorite kubernetes security best practices, and the reasons why we’ve seen such massive adoption of Kubernetes architecture in cloud security over the past few years. 

In this webishop, our CTO, Or Azarzar uses his 10+ years of experience to provide an introduction to the security controls of Kubernetes, including authentication and authorization, secrets management and network controls. On the architecture side, he also provides insight on how to securely set up the control plane and data plane, despite the lack of real separation between the two on Kubernetes.

With informative diagrams and a review of our hands-on lab demonstration, you’ll be able to get a clear understanding of how to see the benefits of this orchestration platform, without opening up your organization to risky configurations or vulnerabilities.

Learn how to secure your Kubernetes environment, including:

  • How to set up your Kubernetes environment, from how to securely set up cluster roles in RBAC, to implementing complex rules at the network level to control traffic.
  • Dangerous defaults currently included in basic Kubernetes deployments, and how to make small changes that can help you gain cloud security quick-wins.  
  • Real-world attack paths, for example ways attackers can bypass authorization controls, or exploit the control plane to take control.

Fill in the form to watch the webinar

Our Speakers

  • Or Azarzar

    CTO

    Lightspin’s contextual cloud security platform protects native, Kubernetes, and microservices from known and unknown risks. Using predictive graph-based technology, Lightspin empowers cloud and security teams to eliminate risks by proactively blocking all attack paths while maximizing productivity by dramatically reducing and prioritizing security alerts, to cut down remediation time.