Register on Crowdcast:|
What you will learn
In recent years, enterprises & developers have started adopting the idea of application modernization by migrating their apps to cloud, applying containerization, using a serverless architecture, & most importantly breaking down their monolithic applications into microservices. Kubernetes plays an important role in this adoption because of the advantages it offers: running & coordinating containerized services across a cluster of machines.
But as we developers are moving into this Kubernetes world, there is one thing we need to be careful of & i.e. security. Did you know that there are multiple attack vectors to a microservice architecture deployed using Kubernetes? Such as insecure pod to pod communication. If not encrypted properly, an attacker can get access to confidential information as the communication between different services happens over a network.
Join us for this webinar where we are going to discuss few security controls that we can use for our Kubernetes architecture including container image security, nodes security, container runtime security & using Istio for secure communication.
* A free IBM Cloud Account: http://ibm.biz/kubernetes_security_webinar
* Basic to intermediate knowledge of Kubernetes
Chandni Vaya, IBM Developer Advocate, https://www.linkedin.com/in/chandni-vaya-519a05137/
Don't forget to register on Crowdcast: