Tigera: Cool Tools for Protecting Your Kubernetes Cluster
Constant vigilance is required to ensure that cloud infrastructure is locked down, and that DevSecOps teams have the right tools for the job. Cloud adds a new dimension and increases an organization’s attack surface. Even a classic CVE can become a greater threat when cloud is factored into the equation. Because of its dynamic, ephemeral nature, Kubernetes ads further complexity to the challenge of protecting microservices. To effectively respond to this new security paradigm, it’s critical for Kubernetes cloud security teams to have the Kubernetes-native tools needed to deploy security controls and detect and mitigate threats.
In this discussion, we’ll explore the extensive contents of Calico Cloud and Calico Enterprise’s cluster protection “toolbox” that support east-west and north-south controls, as well as compliance. We’ll also highlight the intrusion detection and protection (IDS/IPS) capabilities that are at your fingertips. Whether you need to control egress access, encrypt data-in-motion, detect and prevent lateral movement, or deploy honeypods to lure attackers away from your most valuable production assets, Calico Cloud and Calico Enterprise empower you with solutions that automate and simplify your security tasks.
You will learn…
– What workload protection capabilities exist in Calico Cloud and Calico Enterprise, and the challenges they address
– How you can develop a defense-in-depth security posture
– How DevOps teams can deploy “self-service” security to achieve greater autonomy