As Kubernetes adoption grows, so does its attack surface. In “Lock It Down: Security Practices for Modern Kubernetes Clusters,” we dig into practical strategies for securing workloads across your environment—from access controls and network policies to secrets management and runtime threat detection.
This session covers both foundational and advanced security practices, drawing from recent industry incidents and real-world use cases to help you assess and strengthen your Kubernetes posture.
We cover:
- Best practices for RBAC, pod security, and network segmentation
- Securing secrets and reducing exposure to API vulnerabilities
- Tools for image scanning, runtime protection, and audit logging
- Tips to align with CIS Benchmarks and other hardening frameworks