With Docker and AWS announcing Kubernetes support, it’s becoming more and more clear that Kubernetes is today’s dominant container orchestration platform. With this rise comes an increased focus on Kubernetes security – how is it different than just plain docker security? How can you ensure your applications running in Kubernetes are protected? At Twistlock, we’re committed to helping our customers answer these questions – which is why we’re proud to be a Kubernetes Technology Partner. Companies using Kubernetes can deploy confidently with Twistlock, knowing that their applications are automatically firewalled and protected against threats both known and unknown.
If you’re just getting started with Kubernetes, or want to learn more about security best practices for your Kubernetes cluster – we’ve pulled together some of our favorite resources on these subjects – read more below and get in touch with our team to see Twistlock’s protection in action. For those of you at this week’s KubeCon, come visit our team at booth G28.
Just starting with Kubernetes? Want to make sure you’re maximizing your use of the platform and its components? This eBook from The New Stack provides a comprehensive overview into any and all things Kubernetes – from a guide to the ecosystem, to best practices for adopting and scaling your Kubernetes deployment.
Amazon’s recent debut of EKS, their managed Kubernetes offering, provides yet another way for organizations to adopt Kubernetes. With EKS, much of the operational overhead of Kubernetes is handled by AWS – but security remains an open issue. In this post, Twistlock CTO John Morello outlines how Twistlock secures EKS applications.
Early this year, Twistlock actively participated in the creation of the Kubernetes CIS Benchmark. Our team extended this work by building the benchmark natively into the Twistlock platform. Read the 3 easy steps to Kubernetes Security to learn how to easily and automatically secure your Kubernetes deployment. Or check out our webcast, Automatically Securing Kubernetes for a more detailed look at best practices for protecting your applications.
Want to learn more about security features built into the Kubernetes platform, like pod security policies and RBAC? Read the Twistlock Labs research team’s security-focused reviews of Kubernetes 1.7 and Kubernetes 1.8 to learn tips for protecting your Kubernetes environment – and where best to leverage additional protection.
Follow us on Twitter
Follow us on Twitter for real time updates on the cloud native ecosystem, Twistlock product, and cloud native security threats.
How to Securely Configure a Linux Host for ContainersRead the Blog
Don’t Forget the Audit Trail! The Role of Reporting in SecurityRead the Blog
Securing Cloud Native Applications on Pivotal Container Service (PKS)Read the Blog
What to Know: Gartner’s Security Considerations and Best Practices for Securing Serverless PaaSRead the Blog
Crypto Mining and the Cloud: The Perfect IT Security StormRead the Blog