IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Container network security guide for dummies

Enforcing Kubernetes best practices

For Dummies style cover with whitepaper title at the top
whitepaper

FREE DOWNLOAD

Recent events have put the security of software supply chains squarely in the sights of corporate boardrooms while developers remain under constant pressure to deliver new software to market ever faster.

To accelerate innovation, developers often leverage open-source software (OSS) components. But the unfortunate reality is that threat actors no longer respect the unwritten code of honour in the open-source community and are now actively targeting OSS software components and public repositories. Clearly, development teams must now take proactive steps to ensure container network security.

Access this guide to learn how to:

  • Recognize attack vectors in dev environments
  • Create policies with the NetworkPolicy API
  • Leverage CNI providers
  • Run end-to-end validation tests
  • Secure Kubernetes resources
  • Control ingress traffic
  • Secure east-west communications

Provided by 

VMWare logo

.

Recommended

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

4 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
public cloud

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

3 May 2022
How do you become an ethical hacker?
ethical hacking

How do you become an ethical hacker?

29 Apr 2022

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
IT admin deletes company’s databases and is jailed for seven years
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

16 May 2022
Tool that scans office software for vulnerabilities finds almost 100 in Word and Acrobat
Security

Tool that scans office software for vulnerabilities finds almost 100 in Word and Acrobat

13 May 2022