IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Container network security guide for dummies

Enforcing Kubernetes best practices

For Dummies style cover with whitepaper title at the top
whitepaper

FREE DOWNLOAD

Recent events have put the security of software supply chains squarely in the sights of corporate boardrooms while developers remain under constant pressure to deliver new software to market ever faster.

To accelerate innovation, developers often leverage open-source software (OSS) components. But the unfortunate reality is that threat actors no longer respect the unwritten code of honour in the open-source community and are now actively targeting OSS software components and public repositories. Clearly, development teams must now take proactive steps to ensure container network security.

Access this guide to learn how to:

  • Recognize attack vectors in dev environments
  • Create policies with the NetworkPolicy API
  • Leverage CNI providers
  • Run end-to-end validation tests
  • Secure Kubernetes resources
  • Control ingress traffic
  • Secure east-west communications

Provided by 

VMWare logo

.

Recommended

2022 IBM's Security X-Force cloud threat landscape report
Whitepaper

2022 IBM's Security X-Force cloud threat landscape report

22 Nov 2022
2022 Magic quadrant for Security Information and Event Management (SIEM)
Whitepaper

2022 Magic quadrant for Security Information and Event Management (SIEM)

22 Nov 2022
Seven realities facing SMBs as they enter a future of increased cyber threats
Whitepaper

Seven realities facing SMBs as they enter a future of increased cyber threats

21 Nov 2022
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

14 Nov 2022

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

15 Nov 2022
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

14 Nov 2022
Windows users now able to run Linux apps and distros natively
Microsoft Windows

Windows users now able to run Linux apps and distros natively

24 Nov 2022
Pro-Russia Killnet hackers claim DDoS attack on EU Parliament website
cyber attacks

Pro-Russia Killnet hackers claim DDoS attack on EU Parliament website

24 Nov 2022