Overview
Syllabus
Intro
Today's agenda
Containers change how software is developed
Containers and Kubernetes enable teams to ship faster
Challenges with containers
Cultural shift: Changes to the development pipeline
Where security and efficiency challenges emerge
Workload Security: What are containers & kubernetes configurations?
Example: Container vulnerabilities
Example: Over-permissioned containers
Example: Health probes
Example: Inappropriate resource requests and limits
Let's recap
Why Configuration Validation?
Steps for implementing configuration validation
Ways to implement Configuration Validation
Build your own tools
Use open source tools
Use a Purpose-built Platform
Things to look for in a Purpose-built Platform
Where should you implement Configuration Validation?
Business benefits of Configuration Validation
Fairwinds Guide to Managing Kubernetes Configuration
Taught by
CNCF [Cloud Native Computing Foundation]