Welcome to Sysdig's hands-on workshop. In this workshop, you'll experience some of the security challenges of Kubernetes/EKS first-hand - and how Sysdig can help.
We have provisioned a separate EKS cluster and EC2 instance (to serve as a jumpbox/bastion) for each of you. You'll connect to that jumpbox via AWS SSM Session Manager in your browser - and it is preloaded with all the tools that you'll need to interact with your EKS cluster and work through today's labs.
We have also provisioned a user for you within Sysdig Secure. While this Sysdig SaaS tenancy is shared between everyone in the workshop today, your login is tied to a team within it which, in turn, is filtered (via a Zone) to only show you information about your EKS cluster/environment.
- Runtime Threat Detection and Prevention (Workload/Kubernetes)
- Runtime Threat Detection and Prevention (Cloud/AWS)
- Host and Container Vulnerability Management
- Kubernetes Posture/Compliance
- Risks and Attack Path
- Kubernetes native firewall (NetworkPolicies)
This was just a brief introduction of some of the many capabilities that Sysdig offers customers to help with securing your Kubernetes environments, including AWS EKS, as-a-service.
We'd love to show you more about what Sysdig can do for you in a free trial in your own environment. Reach out to your facilitator for details.
Thank you for coming!