Containers make it easier than ever to prevent insecure deployments, but mistakes and new vulnerabilities happen. Runtime security focuses on responding to breaches as they occur, and gathering information for forensic analysis.
In this talk, Jen will guide you through common runtime security concerns, and discuss how they change as you move to containers and Kubernetes. She’ll describe tools that detect and control compromises. Then she'll demonstrate these tools responding to a compromised container.
You'll leave with an understanding of what to plan for, and how to respond when there's an issue.
You will learn:
- About the importance of defense in depth in the context of Kubernetes deployments
- About common designs for container monitoring software
- See runtime security software in action