Amazon Web Services773 тыс
Следующее
Опубликовано 24 июля 2018, 0:19
Catch up on past live streams and see the upcoming schedule at - amzn.to/2LgxYRj.
Securing workloads on Amazon EKS – in this demo we will show a best practices scenario for securing applications running on EKS. We will start by ensuring that cluster nodes conform to CIS Benchmark security checks. We will then show how you can prevent vulnerable, badly configured, or otherwise risky images from being deployed. We will finish by showing how an attacker might try to inject malicious code (by exploiting a vulnerability, or social engineering a privileged user) and how runtime security controls can prevent the attacker from carrying out his nefarious plan.
Guest: Aqua Security
Date of Event: June 18, 2018
Securing workloads on Amazon EKS – in this demo we will show a best practices scenario for securing applications running on EKS. We will start by ensuring that cluster nodes conform to CIS Benchmark security checks. We will then show how you can prevent vulnerable, badly configured, or otherwise risky images from being deployed. We will finish by showing how an attacker might try to inject malicious code (by exploiting a vulnerability, or social engineering a privileged user) and how runtime security controls can prevent the attacker from carrying out his nefarious plan.
Guest: Aqua Security
Date of Event: June 18, 2018
Свежие видео