Getting started with Cloud Native Security

By Liz Rice

Supported by Aqua Security and AWS

1: Checking for insecure Kubernetes settings

Check your Kubernetes cluster settings

Start Scenario

2: TODO - Including vulnerability scanning in your workflow

Check your container images for vulnerabilities before deployment

Start Scenario

3: TODO - Configuring pods to run securely

Avoid giving your pods unnecessary privileges

Start Scenario

4: TODO - Using GitOps

use GitOps to restrict user access to your cluster, and provide an audit trail

Start Scenario