‎15 Oct 2024 08:40 AM
In this episode, Henrik Rexed @HenrikRexed will unlock the secrets to fortifying every layer of your K8s environment with top security practices, to safeguard and secure your Kubernetes cluster from build to runtime.
-----------------------------
📖 Chapters 📖
00:00 Introduction
01:38 Understanding Hacker Exploits and Defense Basics
08:53 Building Secure Applications and Containers
14:16 Implementing Restricted Permissions for Safety
21:53 Controlling Network Access Within Your Cluster
24:39 Limiting Resource Usage to Prevent DDoS Attacks
25:46 Utilizing Runtime Vulnerability Scanners
27:56 Key Takeaways and Final Thoughts
-----------------------------
Subscribe to our YT channel
Stay up-to-date with Dynatrace! Follow us on Facebook, Instagram, LinkedIn, Twitter, Twitch