Cloud Native Security for the Rest of Us

June 16, 2023

Your mission is to secure the vast tracts of land of the cloud native security landscape. Where do you even start?!? It would be preposterous to cover that whole topic in a single session, but we can at least map it out. Our plan is to break it down into three key areas and review each in turn. - Platform: securing and upgrading our control planes and nodes; isolating compute, storage, and network resources; managing privileges and secrets - User management and permissions: various ways to authenticate and authorize user access; leveraging tools like RBAC and Namespaces, and some common “gotchas” - Software supply chain: what that means; some actual threat models are; how to mitigate them You’ll leave this session with a stronger understanding of the breadth and depth of cloud native security and resources to further develop your knowledge.

Previous
Cloud Native Security Must Go Beyond the Perimeter
Cloud Native Security Must Go Beyond the Perimeter

Perimeter security isn't sufficient for today's cloud native environments and applications. An integrated a...

Next Video
Cloud Native Security & Compliance, with David Zendzian - Tanzu Talk
Cloud Native Security & Compliance, with David Zendzian - Tanzu Talk

We talk about getting PCI compliance into Kubernetes, and other security think in the cloud native world. S...