Video

Compliance and Identity Management in Kubernetes

Compliance with what? Depends on your industry. As k8s continues to expand into regulated enterprises such as government, health care and financials deployments will need to understand how managing users and their access relates to compliance obligations. This session will focus on how identity management can be approached for solving this issue. How do you onboard users? Authorize their access to a namespace? Offboard them? Is there a need to differentiate between a privileged user and an unprivileged user? I'll go beyond the technical implementation in k8s and tie it to specific compliance requirements in FISMA and demo how solving the compliance issue can also improve the usability and security of your k8s deployment. This talk will follow a similar form to  this structure but specifically on k8s.

Watch

Let's Connect

Want to learn more about how Tremolo Security can help your organization take control of your IAM challenges? Hit us up and we'll be back in touch soon.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Additional Resources

No items found.