Kubernetes Deployments: How Not to Get Hacked (Thales eSecurity Inc.)

  1. Moscone North

Kubernetes adoption continues to skyrocket as the standard container orchestration framework. However security and regulatory issues exists in this new frontier. We will cover best practices for secrets management, the 3 A’s (authentication, authorization, and audit), data security, and network security