Skip to content

In this EKS-focused workshop, you will work with AWS and Calico Cloud to learn how to design and deploy best practices to achieve compliance with regulatory frameworks such as PCI, SOC2, HIPAA and others and secure your Kubernetes environment.

Notifications You must be signed in to change notification settings

tigera-solutions/cc-eks-compliance

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AWS Dev Days: Hands-on workshop:
Achieving PCI, SOC2, HIPAA, NIST and GDPR compliance for containerized applications

Welcome

In this EKS-focused workshop, you will work with AWS and Calico Cloud to learn how to design and deploy best practices to achieve compliance with regulatory frameworks such as PCI, SOC2, HIPAA and others and secure your Kubernetes environment.

Enterprises developing compliant cloud-native applications have two primary needs. First, they must secure and govern access to containerized workloads and the Kubernetes environment. Second, they need to simplify audit logging and compliance reporting. The Kubernetes environment is dynamic and distributed, and workloads are ephemeral, making enforcing compliance controls and providing continuous reporting difficult.

The purpose of this repository is to offer you a comprehensive, step-by-step guide on creating an AWS EKS cluster, registering it on Calico Cloud, and securing your cloud-native applications to meet compliance requirements. Although Calico Cloud provides a wide range of functionalities and security features, this workshop will concentrate on a few key features that effectively ensure compliance across multiple regulatory frameworks due to time constraints. If you would like to delve deeper into this topic, please don't hesitate to contact us.

Time Requeriments

The estimated time to complete this workshop is 60-90 minutes.

Target Audience

  • Cloud Professionals
  • DevSecOps Professional
  • Site Reliability Engineers (SRE)
  • Solutions Architects
  • Anyone interested in Calico Cloud :)

Learning Objectives

Learn how to:

  • Scan container images and block deployment based on your security criteria during build time.
  • Preview and enforce security policies to protect vulnerable workloads.
  • Implement zero-trust access controls to prevent egress and lateral movement during runtime.
  • Implement runtime security with IDS/IPS, WAF, and malware detection.
  • Get visibility into Kubernetes cluster traffic to troubleshoot and improve security.

Modules

This workshop is organized in sequencial modules. One module will build up on top of the previous module, so please, follow the order as proposed below.

Module 1 - Prerequisites
Module 2 - Create an EKS cluster
Module 3 - Connect the EKS cluster to Calico Cloud
Module 4 - Scan Container Images
Module 5 - Security Guardrails for Network-based Threats
Module 6 - Configuring IDS protection and Workload-Centric WAF
Module 7 - Quarantine Infected Workloads and KSPM
Module 8 - Clean up


Useful links

Follow us on social media

Note: The examples and sample code provided in this workshop are intended to be consumed as instructional content. These will help you understand how Calico Cloud can be configured to build a functional solution. These examples are not intended for use in production environments.

About

In this EKS-focused workshop, you will work with AWS and Calico Cloud to learn how to design and deploy best practices to achieve compliance with regulatory frameworks such as PCI, SOC2, HIPAA and others and secure your Kubernetes environment.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published