Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Top 10 Istio Security Risks and Mitigation Strategies

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore the top 10 Istio security risks and their mitigation strategies in this 34-minute conference talk by José Carlos Chávez from Tetrate. Gain insights into CNCF's first-ever community-driven list of security risks for Istio deployments, developed by security professionals and cloud native computing experts. Learn how to prioritize security efforts and protect against malicious attacks, data breaches, and other security incidents in cloud native applications. Discover the selection criteria for the list and understand critical topics such as misconfigurations, insecure communication, unsafe authorization patterns, supply chain vulnerabilities, traffic capture limitations, and monitoring failures. Equip yourself with valuable knowledge to enhance the security of your Istio deployments and cloud native computing environments.

Syllabus

Introduction
What is a security risk
Why do I care about security
Security in a Service Mesh
Threat Actors
Misconfiguration
Insecure Communication
Unsafe Authorization Patterns
Weak Service Account Authorization
Broken Object Level Authorization
Supply Chain Vulnerabilities
Ingress Traffic Capture Limitations
Egress Traffic Capture Limitations
Monitoring Failures
What is your security risk
Conclusion

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Top 10 Istio Security Risks and Mitigation Strategies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.