Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Adopting Network Policies in Highly Secure Environments

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore the fundamentals of Cilium Network Policies and application-aware, Identity-based Security in this 33-minute conference talk. Learn to compare default-allow and default-deny policies, adopting a risk-based approach to secure sensitive workloads. Discover various exposure types and strategies for workload security. Gain insights into using observability tools like Cilium, Hubble, and Grafana to visualize ingress and egress connections and configure Network Policies. Understand how Network Policy Guardrails enable self-service management while maintaining control. Acquire the knowledge to effectively secure networks in highly sensitive environments, focusing on Kubernetes networking and distributed computing security.

Syllabus

Adopting Network Policies in Highly Secure Environments - Raymond de Jong, Isovalent

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Adopting Network Policies in Highly Secure Environments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.