Tigera: How security policies can protect your environment from future vulnerabilities like Log4j
Solving a challenge like the Log4j vulnerability is important for a wide range of businesses and Kubernetes deployments; a fortress is only as secure as its weakest door! However, adopting a zero-trust deployment model and security policies is a great step towards mitigating the risk introduced by this kind of vulnerability. Join us to learn:
- How Security Policies can easily be deployed
- How they can help as part of a multi-pronged defense against vulnerabilities
- Considerations for a shift-left security model that enables your developers to maintain velocity whilst keeping your apps secure
You’ll leave this session with some ideas for better cluster security and hopefully less worries next time a serious application vulnerability appears.