target audience: TECH BUYER  Publication date: Oct 2024 - Document type: Tech Buyer Presentation - Doc  Document number: # US52677524

Kubernetes Security Best Practices, 2024

By: 

  • Philip Bues Loading
  • Jim Mercer Loading

Content

  • 14 slides


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

On-line Presentation

Abstract


This IDC Tech Buyer Presentation provides a guide to Kubernetes security best practices. The agenda includes the current state of the industry, best practices, future outlook, and essential guidance for developers, security, and cloud operations. CIOs and CISOs can also find vendor selection guidance and recommendations on how to drive business value along with IDC's latest related research. Sections include:

  • Executive Summary
  • Planning: Be Deliberate
  • Collaborate: Come to a Consensus on Tooling and Platforms
  • Built-in Application Security: DevOps Is Critical
  • Least Privilege Access (LPA)
  • Kubernetes Tuning
  • Acquiring Container Images
  • Protecting the Environment Before Deployment
  • Production Runtime
  • Vendor Selection
  • Related Research


Coverage


Do you have questions about this document
or available subscriptions?