Register for our next webcast - securing containers and Kubernetes with StackRox Save My Seat >
{ .link_text }}

Posts under azure kubernetes service

Azure Kubernetes (AKS) Security Best Practices Part 3 of 4: Runtime Security

Azure Kubernetes (AKS) Security Best Practices Part 3 of 4: Runtime Security

Welcome to part three of our four-part series on best practices and recommendations for Azure Kubernetes Service (AKS) cluster security. Previous posts have discussed how to plan and create secure AKS clusters and container images , and how to lock down AKS cluster networking infrastructure . This post will cover the critical topic of securing the application runtimes for AKS cluster workloads, and the tools and controls available to help enforce best practices in multi-tenant AKS clusters.