(Almost) Secure by Default - Next Steps for Hardening Istio in Production Environments
CNCF [Cloud Native Computing Foundation] via YouTube
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Learn Python with Generative AI - Self Paced Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore crucial security considerations and potential attack vectors when using Istio in production environments through this informative conference talk. Discover how to achieve a zero-trust and defense-in-depth architecture by taking additional steps to lock down your service mesh. Learn about mitigating risks and enhancing overall system security by integrating Istio with Network Policies, third-party Kubernetes tools, and cloud-provided security offerings such as key management services, firewalls, and policy enforcement engines. Gain valuable insights into fully hardening your Istio setup, addressing concerns about mTLS protection, self-signed root certificates, common misconfigurations, and adequate layers of defense. Walk away with practical knowledge on implementing a more robust security posture for your Kubernetes and Istio deployments.
Syllabus
(Almost) Secure by Default - Next Steps for Hardening Istio in Production... - Niranjan Shankar
Taught by
CNCF [Cloud Native Computing Foundation]