Download pdf
Orchestration technologies are becoming ubiquitous, but a glance at the headlines (e.g. the Tesla hack) or search in Shodan (e.g. for etcd) demonstrates that securing those technologies is not always easy. In this P2P session, participants will share methods for securing Kubernetes and orchestration: how to track, technical strategies, and processes to ensure orchestration stays robust over time.