Uptycs Live Webinar
RBAC Security for Kubernetes:
How to Keep Your Clusters Safe
RBAC Security for Kubernetes:
How to Keep Your Clusters Safe
Date Recorded: Tuesday, April 18th
Duration: 30 min
How do security teams determine that the right users have access to the right resources and permissions? Join experts Sudarsan Kannan, Director of Product Management at Uptycs, and Siban Mishra, Senior Product Manager at Uptycs, to learn how role based access control (RBAC) is effectively implemented in container and Kubernetes deployments.
Together, we will evaluate RBAC policies, breaking down the different tactics security teams use to monitor production users, catching potentially dangerous roles, and building confidence around simplifying the management of your RBAC.
Visibility into real-time RBAC is a challenge for most teams, with the sprawl of users, services and devices creating an ever-expanding mesh of roles. Provisioning users and services can be overly-reliant on manual processes, leading to gaps in runtime around who has access to what. Learn how to shift up and enable your team with the clear visibility needed to address RBAC policies.
What you will learn:
- Understand RBAC best practices, common pitfalls to avoid, and how to review RBAC policies regularly to keep your clusters safe
- Monitor RBAC for k8s effectively to prevent unauthorized access to clusters and reduce security risk around exec privileges and visibility into stored secrets
- Break through the noise to locate high priority power users, risky roles, and service accounts with privileged access
Resources for
the modern defender
Prepare for any challenges that lie ahead by choosing
the right tools today.
Gartner Hype Cycle for Application Security, 2022
Gartner Hype Cycle for Application Security, 2022
Gartner Hype Cycle for Application Security, 2022
See Uptycs in action
Start with our free, no-obligation 35-day trial. Get comfortable with Uptycs using synthetic data, then deploy to a live environment.