Learn how to implement comprehensive security measures for Pulsar deployments in cloud-native platforms during this conference talk from Pulsar Summit NA 2023. Discover the complete journey of securing Pulsar clusters from initial release to production deployment, with a focus on highly available, geo-replicated configurations for disaster recovery. Master essential security best practices including vulnerability management in open-source packages, integration with Istio service mesh, implementation of TLS encryption, and JWT token authentication. Explore critical dependencies like PKI, certificate management, DNS, and VAULT, while understanding the implementation of periodic credential rotation. Gain insights into achieving SOC2 and ISO27001 compliance through these security protocols, ensuring both intra and inter cluster communications remain protected in enterprise environments.
End-to-End Secure Deployment: Safeguarding Data Flow and Protecting Against Threats
StreamNative via YouTube
Overview
Syllabus
End to End Secure Deployment: Safeguard Data Flow & Protect Against Threats - Pulsar Summit NA 2023
Taught by
StreamNative