Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Is Istio Ambient Mesh Secure - Exploring Service-to-Service Security

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore the security aspects of Istio Ambient Mesh in this 22-minute conference talk by Christian Posta from Solo.io and John Howard from Google. Delve into the architecture decisions made to preserve zero-trust properties in the sidecarless data plane implementation. Learn about mTLS, workload identity, and security boundaries between infrastructure and application worlds. Examine the secure overlay surface area, system boundaries, and blast radius boundaries. Understand the implications of compromised nodes, data planes, applications, and control planes. Discover the role of Waypoint Proxy and how it contributes to ease of operations in Istio Ambient Mesh.

Syllabus

Intro
Istio Ambient Mesh Data Plane
Sidecar architecture
Ambient architecture
Secure Overlay Surface Area
System Boundaries
Blast Radius Boundaries
Compromised node
Compromised data plane
Compromised application
Compromised control plane
Waypoint Proxy
Ease of Operations

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Is Istio Ambient Mesh Secure - Exploring Service-to-Service Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.