Report this

What is the reason for this report?

Securing the Supply Chain for Kubernetes

Updated on August 18, 2022
Securing the Supply Chain for Kubernetes

About the Talk

Are you worried about the security of your Kubernetes cluster? You should be! Kubernetes clusters make use of many external software dependencies, and this chain of software is vulnerable to attack from malicious actors.

Most software supply chain vulnerabilities can be found in images run on Kubernetes, and being able to secure the supply chain eliminates the biggest attack vector—the applications running in your cluster.

What You’ll Learn

  • Common security issues in Kubernetes clusters
  • How to keep your Kubernetes supply chain safe
  • How to secure your Kubernetes cluster

This Talk Is Designed For

Anyone that wants to harden your Kubernetes clusters against security vulnerabilities.

Prerequisites

You have deployed applications in a Kubernetes cluster before.

Resources

Github

Slides

Thanks for learning with the DigitalOcean Community. Check out our offerings for compute, storage, networking, and managed databases.

Learn more about our products

Still looking for an answer?

Was this helpful?


This textbox defaults to using Markdown to format your answer.

You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

I really like your post.

Creative CommonsThis work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 4.0 International License.
Join the Tech Talk
Success! Thank you! Please check your email for further details.

Please complete your information!

The developer cloud

Scale up as you grow — whether you're running one virtual machine or ten thousand.

Get started for free

Sign up and get $200 in credit for your first 60 days with DigitalOcean.*

*This promotional offer applies to new accounts only.