Kubernetes Security

Security at Orchestration Scale

For teams that use Kubernetes for container orchestration, Twistlock ensures that Kubernetes security scales to meet the needs of your organization. Twistlock allows you to deploy fearlessly with assurance that your images and containers are free of vulnerabilities. Twistlock enforces the security settings you need for regulatory compliance and runtime protection and cloud native firewalls secure your environment and networks from active threats. Twistlock is a Kubernetes Technology Partner.

Automated, Cluster-Wide Deployments

Because Twistlock itself is a cloud native app, you can deploy using standard Kubernetes primitives. Run Console as a Replication Controller, attach a Persistent Volume to it for storage, and automatically deploy Defender to every node with a Daemon Set.

Runtime Protection at Scale

Twistlock provides advanced threat intelligence and machine learning to automatically create and enforce security models — no manual intervention required. Models are created for every image that runs in every pod and are a comprehensive list of known good behaviors across multiple dimensions: process, network, file system and system call.

Implement CIS Benchmarks

With over 200 built-in checks covering the entirety of the Docker and Kubernetes CIS Benchmarks, Twistlock can automatically enforce compliance policies across the container application lifecycle. Import OpenSCAP policies to provide your own custom compliance rules and use our built in templates for PCI, HIPAA, GDPR, and other regulatory regimes. View Compliance Explorer to see a real-time dashboard of your current compliance posture, history over time, and any non-compliant entities.

Free eBook

Deploying Kubernetes with Security and Compliance in Mind

In this 21-page guide, Linux Journal’s Petros Koutopis explores how Kubernetes makes it possible to respond to consumer demands quickly by deploying your applications within a timely manner, scaling those same applications with ease, and seamlessly rolling out new features, all while limiting hardware resource consumption.

Get it Now
Now Tech: Container Security, Q4 2018 Forrester’s Overview of 24 Container Security Vendors
Security pros, infrastructure architects, and devops leaders can use this report to understand the value of a container security provider and review the current market landscape.
Kubernetes Deployment & Security Patterns
Shine a light on answering the question: How well does Kubernetes work in production? Get data research and findings about Kubernetes deployment and security practices.