Sysdig's NIST 800-190 application security guide checklist (moved to Guides 10/16)

Many of your applications are now starting to run on containers in the cloud. This means managing cloud security risk and validating compliance requires a NIST risk management framework. Your security teams understand NIST cybersecurity guidelines, but the challenge is a clear mapping of those NIST controls to container/Kubernetes environments. Ultimately, you need to ensure NIST compliance is not blocking your code from going into production.You'll learn:

  1. How NIST cloud security and compliance is different for containers and Kubernetes
  2. How to map NIST 800-190 controls to container environments in the cloud
  3. How Sysdig Secure can help you make your container and Kubernetes environments NIST 800-190 cloud compliant

Download the guide to learn how to make your container and Kubernetes environments NIST 800-190 compliant.

Please tell us about yourself

Thank you!

We’ve received your submission and will be in touch soon.

Trusted globally
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.

Prioritize and stop the threats that matter most.

When attackers move at cloud speed, every second counts. From prevention to defense, Sysdig is purpose-built and proven for the scale, speed, and complexity of the cloud.