With Docker and AWS announcing Kubernetes support, it’s becoming more and more clear that Kubernetes is today’s dominant container orchestration platform. With this rise comes an increased focus on Kubernetes security – how is it different than just plain docker security? How can you ensure your applications running in Kubernetes are protected? At Twistlock, we’re committed to helping our customers answer these questions – which is why we’re proud to be a Kubernetes Technology Partner. Companies using Kubernetes can deploy confidently with Twistlock, knowing that their applications are automatically firewalled and protected against threats both known and unknown.
If you’re just getting started with Kubernetes, or want to learn more about security best practices for your Kubernetes cluster – we’ve pulled together some of our favorite resources on these subjects – read more below and get in touch with our team to see Twistlock’s protection in action. For those of you at this week’s KubeCon, come visit our team at booth G28.
Just starting with Kubernetes? Want to make sure you’re maximizing your use of the platform and its components? This eBook from The New Stack provides a comprehensive overview into any and all things Kubernetes – from a guide to the ecosystem, to best practices for adopting and scaling your Kubernetes deployment.
Amazon’s recent debut of EKS, their managed Kubernetes offering, provides yet another way for organizations to adopt Kubernetes. With EKS, much of the operational overhead of Kubernetes is handled by AWS – but security remains an open issue. In this post, Twistlock CTO John Morello outlines how Twistlock secures EKS applications.
Early this year, Twistlock actively participated in the creation of the Kubernetes CIS Benchmark. Our team extended this work by building the benchmark natively into the Twistlock platform. Read the 3 easy steps to Kubernetes Security to learn how to easily and automatically secure your Kubernetes deployment. Or check out our webcast, Automatically Securing Kubernetes for a more detailed look at best practices for protecting your applications.
Want to learn more about security features built into the Kubernetes platform, like pod security policies and RBAC? Read the Twistlock Labs research team’s security-focused reviews of Kubernetes 1.7 and Kubernetes 1.8 to learn tips for protecting your Kubernetes environment – and where best to leverage additional protection.
Follow us on Twitter
Keep up to date with the latest news from TwistlockLabs and TwistlockTeam.
Serverless Comparison: Lambda vs. Azure vs. GCP vs. OpenWhisk
Serverless computing adoption is growing at exponential rates. As with...
DevSecOps in Practice
If you understand DevOps, you probably also intuitively understand Dev...
Squaring the Circle: Making CI/CD Fast and Secure
Today, most DevOps teams place priorities on software delivery speed a...
Securing Istio with Twistlock
This article is about Istio, a new service mesh management platform th...
Twistlock Releases Serverless Runtime Defense
A few months ago, we wrote a piece on “The Continuum of Cloud Native...