Tigera: Kubernetes Compliance: Implementing Network Security to achieve compliance with PCI, SOC2 and other frameworks
In today’s regulatory landscape, securing Kubernetes environments and meeting compliance requirements is critical for many organizations. This hands-on workshop provides a comprehensive guide to achieving Kubernetes network security and compliance, with a focus on practical implementation.
Participants will:
- Set up a lab environment and perform a cluster resource inventory
- Master access controls and implement network policies for security, compliance, and workload isolation
- Leverage CIS benchmarks for Kubernetes to meet configuration requirements for compliance
- Map and implement PCI or SOC2 compliance in Kubernetes
- Leverage traffic logs for evidence reporting, and dashboards for policy gap visualization, alongside encryption for continuous compliance
Learn from experts, how to leverage tools to ensure compliance and maintain robust security in your Kubernetes clusters.