WorkshopContainer & Kubernetes Security 101: Fundamentals and Best Practices


About workshop

Container security safeguards the infrastructure of your software applications and ensures their smooth operation. It enhances productivity and operational efficiency by granting control over potential systemic or malicious cyber threats.
As business expands, keeping digital assets safe through established cyber infrastructure becomes crucial. The right approach not only reduces costs but also mitigates errors, ultimately bolstering long-term operational efficiency.
CyberArk applies intelligent privilege controls to all identities – human & machine – with continuous threat detection and prevention across the entire identity lifecycle. With CyberArk Conjur organizations can secure all application secrets. With this workshop Discover how Conjur can help enterprises secure secrets across DevOps and CI/CD tools such as Ansible, Cloudbees CI and Jenkins; container orchestration platforms like Kubernetes that run high-volume, mission-critical apps.
Prisma Cloud secures applications from code to cloud, enabling security and DevOps teams to effectively collaborate to accelerate secure cloud-native application development and deployment. In this workshop, you'll explore cloud-native security principles, best practices for Prisma Cloud Compute, and deep dive into container security and micro segmentation with Palo Alto Networks.
Join our workshop to discuss Container & Kubernetes Security 101 and try out the solutions of the top vendors — CyberArk and Palo Alto Networks.

Agenda

  • Introduction to Container Technology● Why Container de facto● Container vs Virtual Machines● Container pros&cons● Introduction to Kubernetes● Which Problems are solved with Kubernetes● Main Components & Architectural Overview(50 minutes) BREAK (10 minutes)

  • Introduction to Cloud Native Security● New Security Approach & Shift Left● Workload Protection with Prisma Cloud Compute● Network Security in Kubernetes and Container World● Prisma Cloud & DevSecOps (50 minutes)
    BREAK (10 minutes)

  • Introduction to Secret Management● Existing Secret Vulnerabilities on DevOps & DevSecOps● Existing Secret Vulnerabilities on Private & Public Cloud● Solving Problems with Conjur Approaches(50 minutes)

  • ● Detecting sensitive information in Container using PCC● Compliance Report● Solving this finding using CyberArk Conjur● Moving Secrets to Vault & Secure Accessing from Container● Web Application & API Security (WAAS)● Virtual patching with Prisma Cloud Compute (Log4j Demo)


Speakers

Illustration

Altug Yıldırım 

Solution ArchitectQuasys

Illustration

Emre Yardımcı 

Solution ArchitectQuasys

Workshop organizers

Illustration

Unfortunately, registration for the workshop is already closed
Participation in the workshop is free of charge, by prior registration.Location: Holiday Inn, Keykab Khanim, Baku, AZ1010 AzerbaijanPresentation language: Turkish

Illustration

About BAKOTECH

BAKOTECH is an international company, a flagship in True Value-Added IT distribution. 
25% of our employees are technical specialists who work directly with clients and together with partners. This approach resulted in 19 years of market presence and continued annual growth. 
Geographically, the company covers 26 countries covering Eastern Europe, the Baltic States, the Balkans, Central Asia and the Caucasus. BAKOTECH offices in Tashkent, Baku, Kyiv, Prague, Brno, Krakow, Vilnius, Astana and Almaty have implemented thousands of projects of various scales and directions. That is why we confidently share our best practices and share with you our experience in solving a variety of problems.