Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

End-to-End Secure Deployment: Safeguarding Data Flow and Protecting Against Threats

StreamNative via YouTube

Overview

Learn how to implement comprehensive security measures for Pulsar deployments in cloud-native platforms during this conference talk from Pulsar Summit NA 2023. Discover the complete journey of securing Pulsar clusters from initial release to production deployment, with a focus on highly available, geo-replicated configurations for disaster recovery. Master essential security best practices including vulnerability management in open-source packages, integration with Istio service mesh, implementation of TLS encryption, and JWT token authentication. Explore critical dependencies like PKI, certificate management, DNS, and VAULT, while understanding the implementation of periodic credential rotation. Gain insights into achieving SOC2 and ISO27001 compliance through these security protocols, ensuring both intra and inter cluster communications remain protected in enterprise environments.

Syllabus

End to End Secure Deployment: Safeguard Data Flow & Protect Against Threats - Pulsar Summit NA 2023

Taught by

StreamNative

Reviews

Start your review of End-to-End Secure Deployment: Safeguarding Data Flow and Protecting Against Threats

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.