K8s Office Hours

Best Practices for Securing and Governing KUBECTL Access to Your Clusters

K8s is the de facto standard for managing modern applications however, securing access to the Kubernetes infrastructure & clusters is difficult and complex. This can lead to breaches and compliance issues, leaving your infrastructure, and company, vulnerable.

Learn the best practices for a secure Kubernetes (and Kubectl) infrastructure from a hands-on practitioner and CKA Lan Nguyen, Sr. Principal Solution Architect at Rafay. Watch this virtual Office Hour to discover best practices and get your K8s questions answered. How to’s that were discussed include:

  • Kubectl access models
  • Controlling & configuring RBAC to clusters
  • Provisioning user access to K8s clusters
  • Auditing Kubectl actions, and
  • Anything else K8s related!

Trusted by leading companies