Mopped to a shared responsibility model (e. 9. ANS) • ARS and user responsibility for security when running container.
5
Security & Compliance of CNCF Landscape
6
Points to consider for kubernetes security
7
Firewall • Control network communication between each component.
8
Encryption
9
Secret management
10
Usage example of sealed-secrets
11
How to management secret values
12
Backup of runtime resource of kubernetes
13
Managing kubernetes resouces with GitOps
14
Vulnerability checking throughout the container life cycle
15
Vulnerability considerations for cluster and node
16
Vulnerability check of build and ship phase
17
Vulnerability considerations for container of run phoze
18
Introducing some setting of Pod Security Policy
19
Vulnerability check of run phase
20
The three pillars of observability
21
The CNCF End User Technology Radar
22
Governance / Compliance
23
Introducing Falco
24
Conclusion
Description:
Explore security measures in Kubernetes environments through this conference talk by Hiroki Akiba from OGIS-RI Co.,Ltd. Delve into the shared responsibility model of major cloud vendors and examine choices for using Kubernetes environments. Learn about security and compliance within the CNCF landscape, focusing on crucial aspects such as firewalls, encryption, and secret management. Discover usage examples of sealed-secrets and techniques for managing secret values. Investigate backup strategies for Kubernetes runtime resources and the implementation of GitOps for resource management. Gain insights into vulnerability checking throughout the container lifecycle, including considerations for clusters, nodes, and containers in various phases. Examine Pod Security Policy settings and explore the three pillars of observability. Familiarize yourself with the CNCF End User Technology Radar and governance/compliance tools like Falco. This comprehensive overview equips you with essential knowledge to enhance security in Kubernetes deployments.
Read more
Focused on Security Measures in Kubernetes Environment