Tigera Events

Microsoft AKS Security Bootcamp: Kubernetes Posture Management (KSPM) and Compliance

Topics:

Security AKS
EMEA
April 18, 2024
10:00 am GMT

Happening this week

Explore Tigera Events

  • AVAILABILITY

  • CATEGORY

  • REGION

  • PARTNER

  • TOPIC

Attend this in-depth, hands-on security workshop with Calico and Amazon AWS experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

This workshop is designed to provide hands-on experience for you to:

  • View service-to-service communication to assess security risk from external threats
  • Analyze and fix security policy gaps within the cluster
  • Detect and prevent anomalous behaviors such as attempts to access restricted URLs
  • Implement security policies in runtime to mitigate risk based on vulnerabilities found in build time

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

  •  Jennifer Luther Thomas

Event Partner: 

In this AKS security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment.

The workshop will guide you in implementing:

  • Deploy zero-trust workload access controls with namespace isolation recommendations
  • Extend firewall protection at the granular, workload level
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

  •  Jonathan Sabo

Event Partner: 

In this EKS networking workshop, you will work with Amazon AWS and Calico experts to learn how to design, configure, deploy, and secure your Kubernetes network for single and multi-cluster environment across Standard Linux, eBPF, and Windows dataplanes. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment.

The workshop will guide you in:

  • Networking Options across Linux, eBPF, Windows dataplanes
  • Address IP exhaustion issues and encrypt data-in-transit
  • Author and enforce workload-level network policy

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

  •  Rui De Abreau

Event Partner: 

Attend this in-depth, hands-on, EKS security workshop with Amazon EKS and Calico experts to learn how to strengthen the security posture of your cluster with network-based controls running on EKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

You will leave this workshop with hands-on experience on how to:

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Get namespace isolation with security policy recommendation
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level
  • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

  •  Kartik Bharath

Event Partner: 

Attend this in-depth, hands-on, AKS security workshop with Microsoft Azure and Calico experts to learn how to strengthen the security posture of your cluster with network-based controls running on AKS. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

You will leave this workshop with hands-on experience on how to:

  • Deploy zero-trust workload access controls (including DNS as policy and egress gateway)
  • Get namespace isolation with security policy recommendation
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level
  • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

  •  Jeremy Guerrand

Event Partner: 

Attend this in-depth, hands-on security workshop with Calico and Microsoft Azure experts to get insights into Kubernetes cluster traffic, workload interactions, and security policy enforcement. The 90-minute interactive lab comes with your own provisioned Calico Cloud environment and a sample application.

This workshop is designed to provide hands-on experience for you to:

  • View service-to-service communication to assess security risk from external threats
  • Analyze and fix security policy gaps within the cluster
  • Detect and prevent anomalous behaviors such as attempts to access restricted URLs
  • Implement security policies in runtime to mitigate risk based on vulnerabilities found in build time

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

  •  Jennifer Luther Thomas

Event Partner: 

In this EKS security workshop, you will work with Calico and Amazon AWS experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on EKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment.

The workshop will guide you in implementing:

  • Deploy zero-trust workload access controls with namespace isolation recommendations
  • Extend firewall protection at the granular, workload level
  • Block lateral movement of APTs with identity-aware microsegmentation
  • Apply zero-trust security controls at application level

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

  •  Rui De Abreau

Event Partner: 

The use of Amazon EKS is becoming more prevalent in the healthcare sector for their healthcare application modernization. To ensure compliance with HIPAA’s privacy regulations, DevOps, SREs, and platform teams must safeguard sensitive PII and PHI data in Amazon EKS workloads.

This webinar will provide a detailed tutorial on how to achieve HIPAA compliance with Calico network security controls and fulfill audit criteria for containers and Kubernetes, including:

  • Mapping HIPAA requirements to your workloads,
  • Implementing security measures and protocols,
  • Maintaining compliance, and preparing‌ audit reports.
  •  Gokhul Srinivasan
  •  Dhiraj Sehgal

Event Partner: 

In this EKS-focused security workshop, you will work with Amazon AWS and Calico experts to learn how to design and deploy best practices to secure your Kubernetes environment and achieve compliance with regulatory frameworks, including but not limited to HIPAA, PCI, SOC 2 and GDPR. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment.

The workshop will guide you in implementing:

  • Kubernetes Security Posture Management (KSPM)
  • Security policies for compliance
  • Evidence and audit reporting

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

  •  Regis Martins

Event Partner: 

In this AKS networking workshop, you will work with Microsoft Azure and Calico experts to learn how to design, configure, deploy, and secure your Kubernetes network for single and multi-cluster environment across Standard Linux, eBPF, and Windows dataplanes. This 90-minute hands-on lab comes with your own provisioned Calico Cloud and a sample app environment.

The workshop will guide you in:

  • Networking Options across Linux, eBPF, Windows dataplanes
  • Address IP exhaustion issues and encrypt data-in-transit
  • Author and enforce workload-level network policy

We have limited the number of participants for this workshop to ensure that each participant can receive adequate attention.

  •  Ivan Sharamok

Event Partner: