Tigera: Kubernetes Zero Trust: Leveraging Calico's Host Endpoint Policies for Enhanced Security
In this session, we will briefly go over Kubernetes components and their roles. Then, we will delve into the realm of security and examine how the default configurations of these components could be used to attack your environment and how a zero-trust posture can help against the attacks that are targeting your clusters. By the end of this session, attendees will be able to:
- Secure Kubernetes components and spot misconfigurations.
- Learn How to secure your Kubernetes host workloads.
- Discover how eBPF policies can improve efficiency and security in a cluster.