Back to Webinars
On-Demand 55 min

Securing Kubernetes Access at Scale

Learn how to implement enterprise-grade security controls for Kubernetes clusters. Discover best practices for certificate-based authentication, fine-grained RBAC, namespace isolation, and comprehensive kubectl auditing.

Watch this webinar on-demand

Watch Now

Overview

As Kubernetes adoption grows, securing cluster access becomes increasingly critical. Traditional approaches using static kubeconfig files and long-lived service account tokens create security gaps and compliance challenges. This webinar explores modern approaches to securing Kubernetes access using certificate-based authentication, dynamic RBAC policies, and comprehensive audit logging.

You'll learn practical strategies for implementing zero-trust access controls for Kubernetes, including hands-on demonstrations of certificate rotation, namespace isolation, pod exec controls, and kubectl session recording. Our experts will share real-world experiences from securing production Kubernetes environments at scale.

What You'll Learn

  • Implementing certificate-based authentication for kubectl access
  • Advanced Kubernetes RBAC patterns and role design
  • Namespace isolation and multi-tenancy security controls
  • Controlling and auditing kubectl exec and port-forward operations
  • Session recording and compliance requirements for K8s access
  • Integrating Kubernetes access with identity providers and SSO

Key Topics Covered

  • Kubernetes authentication mechanisms and certificate rotation
  • Designing effective RBAC roles and cluster roles
  • Service account security and workload identity
  • Pod security policies and admission controllers
  • Kubectl audit logging and session recording
  • Namespace isolation and network policies
  • Just-in-time access and temporary privilege escalation
  • Multi-cluster access management at scale
  • Compliance requirements (SOC2, PCI-DSS) for K8s environments
  • Real-world case studies and migration strategies

Who Should Attend

This webinar is ideal for:

  • Platform engineers managing Kubernetes infrastructure
  • DevOps teams implementing secure cluster access
  • Security architects designing K8s security controls
  • Compliance teams ensuring K8s audit requirements

Featured Speakers

David Martinez

Senior Platform Engineer

TigerAccess

David leads the Kubernetes security team at TigerAccess and has extensive experience building secure multi-tenant K8s platforms. He previously worked at Google Cloud helping customers implement GKE security best practices.

Rachel Kim

Cloud Native Security Architect

CNCF Technical Advisory Group

Rachel is a Kubernetes security expert and active CNCF contributor. She has led security initiatives for major cloud-native projects and authored several security white papers for the Kubernetes community.

Ready to Secure Your Infrastructure?

Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.

No credit card required • 14-day free trial • Enterprise support available