NIST 800-190 Application Security Guide Checklist

Many of your applications are now starting to run on containers in the cloud. This means managing cloud security risk and validating compliance requires a NIST risk management framework. Your security teams understand NIST cybersecurity guidelines, but the challenge is a clear mapping of those NIST controls to container/Kubernetes environments. Ultimately, you need to ensure NIST compliance is not blocking your code from going into production.

You’ll learn:

  • How NIST cloud security and compliance is different for containers and Kubernetes
  • How to map NIST 800-190 controls to container environments in the cloud
  • How Sysdig Secure can help you make your container and Kubernetes environments NIST 800-190 cloud compliant

Download the guide to learn how to make your container and Kubernetes environments NIST 800-190 compliant.

Download the guide

Thank you!

We’ve received your submission and will be in touch soon.

Trusted globally
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.

Prioritize and stop the threats that matter most.

When attackers move at cloud speed, every second counts. From prevention to defense, Sysdig is purpose-built and proven for the scale, speed, and complexity of the cloud.