Many organizations are rapidly moving to Kubernetes for its proven portability, flexibility, and increased developer productivity. The use of containers allows many organizations and system owners to develop new code and deploy at a fast pace with repeatable and automated processes. However, these benefits present your organization with unique challenges across multiple levels for securing the platform itself and services within.
Experts looked at the multiple levels of securing the services within Kubernetes, starting at the API layers and users accessing the APIs. From there, the speakers broke down the approaches to service accounts and how they authenticate to the platform. They then broke down the different authorization modes within Kubernetes and how they can integrate with your existing investments in SailPoint and Privileged Access Management tools.
Lastly, attendees learned the best practices to govern authorization between workloads within a Kubernetes cluster, manage secrets, and implement Open Policy Agent (OPA) rules to control pod deployment based on risk.
Watch this archived recording to learn: