Is Istio Ambient Mesh Secure - Exploring Service-to-Service Security
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security aspects of Istio Ambient Mesh in this 22-minute conference talk by Christian Posta from Solo.io and John Howard from Google. Delve into the architecture decisions made to preserve zero-trust properties in the sidecarless data plane implementation. Learn about mTLS, workload identity, and security boundaries between infrastructure and application worlds. Examine the secure overlay surface area, system boundaries, and blast radius boundaries. Understand the implications of compromised nodes, data planes, applications, and control planes. Discover the role of Waypoint Proxy and how it contributes to ease of operations in Istio Ambient Mesh.
Syllabus
Intro
Istio Ambient Mesh Data Plane
Sidecar architecture
Ambient architecture
Secure Overlay Surface Area
System Boundaries
Blast Radius Boundaries
Compromised node
Compromised data plane
Compromised application
Compromised control plane
Waypoint Proxy
Ease of Operations
Taught by
CNCF [Cloud Native Computing Foundation]