Tigera: How security policies can protect your environment from future vulnerabilities like Log4j

Tigera: How security policies can protect your environment from future vulnerabilities like Log4j

 PT
Online

Solving a challenge like the Log4j vulnerability is important for a wide range of businesses and Kubernetes deployments; a fortress is only as secure as its weakest door! However, adopting a zero-trust deployment model and security policies is a great step towards mitigating the risk introduced by this kind of vulnerability. Join us to learn:

  • How Security Policies can easily be deployed
  • How they can help as part of a multi-pronged defense against vulnerabilities
  • Considerations for a shift-left security model that enables your developers to maintain velocity whilst keeping your apps secure

You’ll leave this session with some ideas for better cluster security and hopefully less worries next time a serious application vulnerability appears.