Zero Trust Security: Supporting a CARTA approach with Continuous Monitoring

Zero Trust Security: Supporting a CARTA approach with Continuous Monitoring

Mar 28, 2019

Learn how to support a continuous adaptive risk and trust assessment (CARTA) approach leveraging accurate Kubernetes flow logs. 5-tuple logging is commonly used to monitor and detect anomalies and produces unreliable data that cannot accurately identify anomalies nor prove enforcement of security policies. Network flow logs include workload identity and other metadata that help continuously monitor activities within Kubernetes clusters.