Posted on
in Presentations
This session will focus on how a team built a secure Kubernetes environment by mapping CIS controls into our SDLC pipelines. You will learn how to build your perfect burrito using security controls, business priorities, and maturity level.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community