Webinar On Demand
5 Of The Most Common Kubernetes Security Misconfigs And How To Fix Them
Recorded September 21, 2021
Join Us for a Complimentary Webinar Sponsored by Bridgecrew
We dug through our analytics and found five of the most common misconfigurations identified by Checkov, our powerful open-source security scanner for infrastructure as code (IaC). In this talk, we’ll walk through each of the misconfigurations and the potential issue the misconfiguration introduces to your workload. Then, we’ll include an example of each misconfiguration and how to fix it for more secure Kubernetes workloads defined in code.
In this webinar we will discuss:
- Five of the most common misconfigurations from our customers’ scans (1 low, 1 medium, 3 high/critical)
- Why someone may want to use them (e.g., makes it easier to develop something if you give it root access)
- What’s wrong with doing it that way
- How to fix each misconfiguration
Taylor Smith , Senior Product Marketing Manager, Bridgecrew
Taylor is a senior product marketing manager for Bridgecrew by Prisma Cloud at Palo Alto Networks. He helps customers integrate security into DevOps practices to secure the entire cloud native stack. Previously, he held product marketing and strategy positions at Gremlin, Cisco, and NetApp.