Skip to content

EKS Security Bootcamp: Implement Network Security with Calico Cloud

Notifications You must be signed in to change notification settings

tigera-solutions/cc-eks-network-security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Amazon EKS Security Bootcamp: Hands-on EKS workshop
Implementing Kubernetes Network Security for EKS Containers and Workloads

Welcome

In this EKS-focused workshop, you will work with AWS and Calico Cloud to learn how to design and deploy best practices to secure your Kubernetes environment, detecting and blocking network-based attacks in your clusters.

Cloud-native applications require a modern approach based on the zero-trust principles of identity-based access, least privilege access, and proactively detecting threats and reducing the blast radius in case of a breach.

Calico Cloud enables fine-grained, zero-trust workload access controls between your microservices and external databases, cloud services, APIs, and other applications. It also prevents the lateral movement of threats with identity-aware segmentation that works across your workload environments, including hosts, VMs, Kubernetes components, and services.

You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in AWS, along with best practices that you can implement in your organization.

Time Requirements

The estimated time to complete this workshop is 60-90 minutes.

Target Audience

  • Cloud Professionals
  • DevSecOps Professional
  • Site Reliability Engineers (SRE)
  • Solutions Architects
  • Anyone interested in Calico Cloud :)

Learning Objectives

  1. Review and customize security guardrails for network-based threats
  2. Configure IDS/IPS, workload-centric WAF, and DDoS protection
  3. Detect zero-day attacks based on suspicious container activity using syscalls, file access, and process information
  4. Preview and enforce security policies to quarantine infected workloads
  5. Visualize the security posture of your Kubernetes cluster

Modules

This workshop is organized in sequential modules. One module will build up on top of the previous module, so please, follow the order as proposed below.

Module 1 - Getting Started
Module 2 - Deploy an EKS cluster
Module 3 - Connect the EKS cluster to Calico Cloud
Module 4 - Security Guardrails for Network-based Threats
Module 5 - Configuring IDS protection and Workload-Centric WAF
Module 6 - Detect Zero-Day Attacks with Threat Defence
Module 7 - Quarantine Infected Workloads and KSPM
Module 8 - Clean up


Useful links

Follow us on social media

Note: The workshop provides examples and sample code as instructional content for you to consume. These examples will help you understand how to configure Calico Cloud and build a functional solution. Please note that these examples are not suitable for use in production environments.

About

EKS Security Bootcamp: Implement Network Security with Calico Cloud

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published