Security with Istio: Using Authorization Policies

  Рет қаралды 3,792

Lukonde Mwila

Lukonde Mwila

Күн бұрын

When securing your container workloads in Kubernetes, it's important to have defence in depth. This. means having layers of security. As important as it is to have mTLS enabled in the Istio service mesh, you should also implement access control between services. To do this in Istio, you make use of Authorization Policies. After we've validated the identity of a service, we should check whether or not it's permitted to carry out the desired action when communicating with another service. With Istio Authorization Policies, you can define access control rules at different levels or scopes. It could be for the entire mesh, a specific namespace, or a specific workload depending on your use case. The envoy sidecar proxy is what's actually responsible for executing this. So when the service proxy intercepts incoming requests, it will use the Istio Authorization Policy to verify if the sender has the right permissions to execute the operation.
In this video, I'll show you how to use Istio Authorization Policies.
#kubernetes #istio #servicemesh
Timestamps:
00:00 - Introduction
00:15 - Authentication (AuthN) vs Authorization (AuthZ)
00:21 - Authorization (AuthZ) explained
00:50 - Overview of using Istio Authorization policies for secure communication between services in Istio
01:51 - Demo on how to implement Istio Authorization Policies for microservice workloads in Kubernetes
Repositories with source code:
github.com/LukeMwila/istio-ga...
github.com/LukeMwila/microser...
Other relevant videos:
Using Istio Gateway to Route Traffic to Microservices on Amazon EKS - • Using Istio Gateway to...
Secure Istio Gateway Traffic with TLS Encryption on Amazon EKS - • Secure Istio Gateway T...
How to Configure mTLS in Istio for Secure Kubernetes Workload Communication - • How to Configure mTLS ...
Connect:
GitHub: github.com/LukeMwila
Twitter: / luke9ine
Medium: / outlier.developer
LinkedIn: / lukonde-mwila-25103345
If you found this video helpful, please like the video and subscribe to the channel!

Пікірлер: 3
@vibales
@vibales 5 ай бұрын
Great example, finally got working my project 🎉
@matc8085
@matc8085 6 ай бұрын
Your content is superb
@domw2391
@domw2391 8 ай бұрын
What protocol you use between communication between services? Rest or gPRC?
How to Setup External CA Integration in Istio
25:47
Lukonde Mwila
Рет қаралды 2,6 М.
Using Istio Gateway to Route Traffic to Microservices on Amazon EKS
14:07
WHO LAUGHS LAST LAUGHS BEST 😎 #comedy
00:18
HaHaWhat
Рет қаралды 23 МЛН
Каха и суп
00:39
К-Media
Рет қаралды 6 МЛН
Looks realistic #tiktok
00:22
Анастасия Тарасова
Рет қаралды 104 МЛН
Securing Requests with Keycloak and Istio through Request-Level Authentication
26:21
CNCF [Cloud Native Computing Foundation]
Рет қаралды 3,1 М.
Deep Dive into Istio Auth Policies
33:06
Istio
Рет қаралды 11 М.
Auth Patterns: What to Use and When
35:44
Istio
Рет қаралды 1,9 М.
Using Argo CD and Rancher for Kubernetes Multi-tenancy & GitOps
26:13
Pod Topology Spread Constraints in Kubernetes
9:43
Lukonde Mwila
Рет қаралды 3,2 М.
Secure Istio Gateway Traffic with TLS Encryption on Amazon EKS
13:10
Istio & Service Mesh - simply explained in 15 mins
16:09
TechWorld with Nana
Рет қаралды 644 М.
Episode 05: Security in Istio
43:16
Tetrate
Рет қаралды 2,1 М.
Istio Ingress Gateway vs. Kubernetes Ingress Demo
46:43
Mirantis
Рет қаралды 10 М.
Better External Authorization
40:59
Istio
Рет қаралды 3,2 М.
😱Хакер взломал зашифрованный ноутбук.
0:54
Последний Оплот Безопасности
Рет қаралды 968 М.
EXEED VX 2024: Не өзгерді?
9:06
Oljas Oqas
Рет қаралды 47 М.
СТРАШНЫЙ ВИРУС НА МАКБУК
0:39
Кринжовый чел
Рет қаралды 1,5 МЛН
Cheapest gaming phone? 🤭 #miniphone #smartphone #iphone #fy
0:19
Pockify™
Рет қаралды 4,2 МЛН