Adopting Network Policies in Highly Secure Environments - Raymond de Jong, Isovalent

  Рет қаралды 2,324

CNCF [Cloud Native Computing Foundation]

CNCF [Cloud Native Computing Foundation]

Күн бұрын

Adopting Network Policies in Highly Secure Environments - Raymond de Jong, Isovalent
In the world of distributed computing, everything goes over the network, but not everything should be public. Unfortunately, Kubernetes networking is open by default and it is up to you to adopt network policies to secure it. Using our knowledge of implementing network policies in complex regulated environments, we will introduce the fundamentals of Cilium Network Policies and the basics of application-aware and Identity-based Security. With these building blocks in place, we will compare a default-allow with a default-deny policy and how a risk-based approach helps you focus on securing the most sensitive workloads first. We will then discuss various exposure types and strategies for securing your workloads. Applying this theoretical knowledge to the real world, we will explore how observability tools Cilium, Hubble, and Grafana provide you with Network Policy superpowers, like showing how ingress and egress connections are visualized, enabling you to configure the Network Policies using the Network Policy editor. Finally, we will discuss how Network Policy Guardrails allow for keeping control while granting teams self-service management of Network Policies. The audience will learn how to secure their network effectively and efficiently, even for highly sensitive workloads.

Пікірлер
Surviving Day 2 - How to Troubleshoot Kubernetes Networking - Thomas Graf, Isovalent
49:16
CNCF [Cloud Native Computing Foundation]
Рет қаралды 4,2 М.
Building High-Throughput Applications with Bulk Messaging in Dapr - Shubham Sharma, Microsoft
26:33
CNCF [Cloud Native Computing Foundation]
Рет қаралды 1,5 М.
Help Me Celebrate! 😍🙏
00:35
Alan Chikin Chow
Рет қаралды 84 МЛН
Who’s the Real Dad Doll Squid? Can You Guess in 60 Seconds? | Roblox 3D
00:34
哈哈大家为了进去也是想尽办法!#火影忍者 #佐助 #家庭
00:33
火影忍者一家
Рет қаралды 125 МЛН
Securing Cluster Networking with Network Policies - Ahmet Balkan, Google
30:55
CNCF [Cloud Native Computing Foundation]
Рет қаралды 29 М.
Creating Effective Docker Images
34:00
Docker
Рет қаралды 28 М.
Kubernetes Network Policies Explained
19:02
DevOps Toolkit
Рет қаралды 13 М.
A Guided Tour of Cilium Service Mesh - Liz Rice, Isovalent
43:19
CNCF [Cloud Native Computing Foundation]
Рет қаралды 14 М.
Network Security - Deep Dive Replay
3:08:19
Kevin Wallace Training, LLC
Рет қаралды 167 М.
Kerberos Authentication Explained | A deep dive
16:52
Destination Certification
Рет қаралды 348 М.
Kubernetes 101 workshop - complete hands-on
3:56:03
Kubesimplify
Рет қаралды 1,6 МЛН
Help Me Celebrate! 😍🙏
00:35
Alan Chikin Chow
Рет қаралды 84 МЛН