In this webinar we will take a look at some of the most important techniques used to create Zero Trust services in a Kubernetes environment. This talk will cover concepts ranging from container image hardening to pod specification runtime constraints and from network policy to platform centric security. Upon completion, attendees will have a detailed understanding of some of the key mechanisms in Kubernetes tool chains available to facilitate Zero Trust computing.
Presented by:
RX-M