(Almost) Secure by Default - Next Steps for Hardening Istio in Production Environments
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Explore crucial security considerations and potential attack vectors when using Istio in production environments through this informative conference talk. Discover how to achieve a zero-trust and defense-in-depth architecture by taking additional steps to lock down your service mesh. Learn about mitigating risks and enhancing overall system security by integrating Istio with Network Policies, third-party Kubernetes tools, and cloud-provided security offerings such as key management services, firewalls, and policy enforcement engines. Gain valuable insights into fully hardening your Istio setup, addressing concerns about mTLS protection, self-signed root certificates, common misconfigurations, and adequate layers of defense. Walk away with practical knowledge on implementing a more robust security posture for your Kubernetes and Istio deployments.
Syllabus
(Almost) Secure by Default - Next Steps for Hardening Istio in Production... - Niranjan Shankar
Taught by
CNCF [Cloud Native Computing Foundation]