In this session, Kubernetes experts from GDIT and D2iQ discuss how to secure your digital assets and create a Zero Trust culture within your organization.
Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero-trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption, and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks.
Developers and security experts are now tasked with extending Kubernetes’ built-in security to effectively protect against more complex, volatile, and frequent cyber attacks. The previous “trust but verify” approach has often proven ineffective for the complex distributed nature of cloud computing, so Kubernetes security is being elevated to the “never trust, always verify” ideology of the zero-trust model to provide greater protection to organizations.
Key Takeaways:
—Basic Concepts of the Zero-Trust Model
—Three Best Practices for Zero Trust
1) Optimize Software Configuration, Access Permissions
2) Log and Monitor Data
3) Focus on People and Process Management
—How to Create a Zero Trust Security Culture