As you roll out Kubernetes across your organization, you’ll find that while Kubernetes helps accelerate agile innovation, it also introduces operational complexity and increases attack vectors due to its distributed architecture.
Join builders from SentinelOne and Amazon Web Services (AWS) for a live webinar where they'll provide practical approaches to securing your Kubernetes clusters. This session will cover common attack vectors, security considerations when choosing a Kubernetes platform and strategies and best practices for detecting and resolving security incidents. You'll also get a live demo of an investigation and resolution of a real-world security incident with SentinelOne Singularity Cloud.
Key Takeaways:
- Common attack vectors and threat modeling in Kubernetes
- Security considerations when choosing a K8s platform: Amazon Elastic Compute Cloud (EC2), as a managed service via Amazon Elastic Kubernetes Service (EKS) or on-premises using Amazon EKS Distro (EKS-D)
- Strategies and best practices to detect and resolve security incidents
- Threat hunting and forensics using EKS Audit Logs
- Demo of an investigation and resolution of real-world security incidents with SentinelOne Singularity Cloud.
Смотрите видео Securing Kubernetes With SentinelOne and AWS онлайн без регистрации, длительностью часов минут секунд в хорошем качестве. Это видео добавил пользователь Techstrong TV 05 Апрель 2023, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 1,15 раз и оно понравилось 1 людям.