Most Common Kubernetes Security Misconfigurations and How to Address Them
There are hundreds of public cases detailing how companies leaked sensitive user data accidentally due to misconfiguration issues. Any data breach can have catastrophic effects on the business and individuals of the compromise.
Along with misconfiguration, people within organizations are also targets. Attackers start with phishing campaigns to get access to the network. If a user's authentication isn't handled properly, it can result in long-term damage to your business. However, the risk of exposing data can be minimized through security scanners or reduced by providing strong centralized access controls.
Ben and Anaïs will discuss misconfigurations, what they are and how to identify and fix them with Trivy, Aqua's open source security scanners for Kubernetes. Next, we will showcase how to deploy identity-based infrastructure access using open-source Teleport Access Plane, moving to a secretless security model to make the secure way the easiest way of accessing infrastructure.
This webinar is aimed at DevOps engineers and developers who want to understand better misconfigurations and anyone who would like to learn how to set up more secure access through Teleport.