Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how Istio enhances Kubernetes security in this 48-minute conference talk. Learn about out-of-process architecture and its ability to add end-to-end encryption and authentication between Kubernetes/OpenShift containers without modifying applications. Discover how Istio can even secure third-party applications lacking built-in security features, such as NoSQL databases. Gain insights into Istio's functionality, benefits, and limitations for providing authentication and encryption in containerized environments. Delve into the core concepts of Istio and its role in orchestrating secure communication between microservices in Kubernetes platforms.