Securing Kubernetes Manifests with Fugue, Regula, and Open Policy Agent
You’ll walk away from this session with a clear picture of:
- Fugue’s pre-built policies mapped to the CIS Kubernetes Benchmark
- Running checks on K8s Manifests in development and using remediation guidance
- Integrating automated checks on K8s manifest files in CI/CD pipelines
Fugue and Regula can secure infrastructure as code tools such as Terraform, AWS CloudFormation, and K8s Manifests. Learn more about Fugue for infrastructure as code security at www.fugue.co/infrastructure-as-code
Learn more about Regula at www.regula.dev and on Github.
Teams using Kubernetes (K8s) Manifests can now run pre-deployment security checks using Fugue’s SaaS cloud security platform, and Regula, the open-source infrastructure as code policy engine built on Open Policy Agent (OPA).
In this session, Fugue’s Ricardo Green (Principal Solutions Engineer) will walk through how to find and fix security issues in your Kubernetes Manifest files pre-deployment.
Ricardo Green
Ricardo Green is a cloud technology evangelist and Principle Solutions Engineer with Fugue. Prior to joining Fugue, he worked in the Cloud Business Unit of a major telecommunications company serving as a managed hosting and cloud computing specialist. He later served as a solutions architect, supporting the company's managed services offerings on the Amazon Web Services platform. Ricardo has been in the cloud and managed hosting space for over 13 years, with the last 8 years focused on cloud architecture. Ricardo has multiple Amazon Web Services certifications and brings his passion for cloud technology to Fugue where he supports efforts in increasing the adoption of Fugue in Enterprise organizations