The role of Kubernetes in cloud security
Get the white paper
This white paper describes how to apply effective security so your organization has visibility, threat detection, and anomaly analysis to risks and threats for Kubernetes-deployed infrastructures, including publicly exposed and unsecured API servers and management consoles.
- Application visibility: Learn how to identify clusters, pods, nodes, and namespaces combined with application level communication between all of these at the application, process, and network layers
- Threat detection: See how detection of risks and threats affect Kubernetes through misconfigurations and threats that can affect your infrastructure by installing malicious code onto one of your containers
- Kubernetes forensics: Understand how to coordinate information among your containers, applications, and infrastructure