Director, Technology Advancement Gentiva Health Services, United States
This session will cover securing deployments of Kubernetes and Docker. It will cover hardening of the Kubernetes cluster according to NSA standards, scanning Docker containers for vulnerabilities, authentication among microservices, best practices in securing APIs, etc. First, we will explore the inherent vulnerabilities of cloud-native applications, and then we will show how these vulnerabilities can be mitigated with good architecture practices and some third-party tools. The session will start with a fictitious vulnerable deployment and end with a secure deployment.
Learning Objectives:
Understand the common security risks and concerns with cloud-native applications.
Assess your unique application architecture, along with the technologies employed, and identify the threats and vulnerabilities you most need to mitigate.
Identify which controls you can deploy (and where) to enhance the security of your cloud-native applications.