• The API Platform for AI.

      Explore More
      Platform Runtimes
      Kong Gateway
      • Kong Cloud Gateways
      • Kong Ingress Controller
      • Kong Operator
      • Kong Gateway Plugins
      Kong AI Gateway
      Kong Event Gateway
      Kong Mesh
      Platform Core Services
      • Gateway Manager
      • Mesh Manager
      • Service Catalog
      Platform Applications
      • Developer Portal
      • API and AI Analytics
      • API Products
      Development Tools
      Kong Insomnia
      • API Design
      • API Testing and Debugging
      Self-Hosted API Management
      Kong Gateway Enterprise
      Kong Open Source Projects
      • Kong Gateway OSS
      • Kuma
      • Kong Insomnia OSS
      • Kong Community
      Get Started
      • Sign Up for Kong Konnect
      • Documentation
    • Featured
      Open Banking SolutionsMobile Application API DevelopmentBuild a Developer PlatformAPI SecurityAPI GovernanceKafka Event StreamingAI GovernanceAPI Productization
      Industry
      Financial ServicesHealthcareHigher EducationInsuranceManufacturingRetailSoftware & TechnologyTransportation
      Use Case
      API Gateway for IstioBuild on KubernetesDecentralized Load BalancingMonolith to MicroservicesObservabilityPower OpenAI ApplicationsService Mesh ConnectivityZero Trust SecuritySee all Solutions
      Demo

      Learn how to innovate faster while maintaining the highest security standards and customer trust

      Register Now
  • Customers
    • Documentation
      Kong KonnectKong GatewayKong MeshKong AI GatewayKong InsomniaPlugin Hub
      Explore
      BlogLearning CentereBooksReportsDemosCase StudiesVideos
      Events
      API SummitWebinarsUser CallsWorkshopsMeetupsSee All Events
      For Developers
      Get StartedCommunityCertificationTraining
    • Company
      About UsWhy Kong?CareersPress RoomInvestorsContact Us
      Partner
      Kong Partner Program
      Security
      Trust and Compliance
      Support
      Enterprise Support PortalProfessional ServicesDocumentation
      Press Release

      Kong Expands with New Headquarters in Downtown San Francisco

      Read More
  • Pricing
  • Login
  • Get a Demo
  • Start for Free
Resources
  • eBooks
  • Reports
  • Case Studies
  • Demos
  • Videos
  • Value Calculator
  • Home
  • Resources
  • Videos
  • Zero-Trust & Kubernetes: Redefine Your Web App & API Security Model
Video

Zero-Trust & Kubernetes: Redefine Your Web App & API Security Model

In the zero trust context, web apps are always exposed, so automated detection and prevention of malicious behavior at layer 7 must be part of a defense-in-depth security strategy.
When it comes to protecting the applications that empower organizations' workforces and customer bases, how can a flexible web app and API security model help security stakeholders enforce zero trust security while still providing an excellent customer experience that drives the business?

At the same time, Kubernetes dominates the container orchestration market. According to the Cloud Native Computing Foundation, 78% percent of organizations are managing some portion of their container workloads using Kubernetes. As more organizations transition from monolith legacy applications to modern, distributed apps, DevOps teams often lean on the speed and scale that Kubernetes enables.

However, scale at velocity introduces security risks: development and operations teams may not adequately secure the Kubernetes control plane, not properly enforce role-based access control (RBAC), or may expose internal services unknowingly—just to name a few. Any development and operations team must secure their containerized apps or risk attackers exploiting those vulnerabilities.

Jimmy Mesta will review the state of Kubernetes security, pitfalls to avoid and best practices for zero trust, including how to use next-gen web application security tooling to automate securing containerized apps and APIs.

He'll also explore the future of service mesh as a means to utilize encrypted persistent connections to secure containerized workloads and how to get visibility into the east-west traffic between services as the perimeter is a moving target.

Speakers

Jimmy Mesta

Senior Manager, Security

Fastly

Topics:Zero-Trust
|
API Security
|
Kubernetes
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Sign up for Kong newsletter

Platform
Kong KonnectKong GatewayKong AI GatewayKong InsomniaDeveloper PortalGateway ManagerCloud GatewayGet a Demo
Explore More
Open Banking API SolutionsAPI Governance SolutionsIstio API Gateway IntegrationKubernetes API ManagementAPI Gateway: Build vs BuyKong vs PostmanKong vs MuleSoftKong vs Apigee
Documentation
Kong Konnect DocsKong Gateway DocsKong Mesh DocsKong AI GatewayKong Insomnia DocsKong Plugin Hub
Open Source
Kong GatewayKumaInsomniaKong Community
Company
About KongCustomersCareersPressEventsContactPricing
  • Terms•
  • Privacy•
  • Trust and Compliance
  • © Kong Inc. 2025