Adopting Network Policies in Highly Secure Environments
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the fundamentals of Cilium Network Policies and application-aware, Identity-based Security in this 33-minute conference talk. Learn to compare default-allow and default-deny policies, adopting a risk-based approach to secure sensitive workloads. Discover various exposure types and strategies for workload security. Gain insights into using observability tools like Cilium, Hubble, and Grafana to visualize ingress and egress connections and configure Network Policies. Understand how Network Policy Guardrails enable self-service management while maintaining control. Acquire the knowledge to effectively secure networks in highly sensitive environments, focusing on Kubernetes networking and distributed computing security.
Syllabus
Adopting Network Policies in Highly Secure Environments - Raymond de Jong, Isovalent
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Cilium - Kernel Native Security and DDOS Mitigation for Microservices with BPFDocker via YouTube Introduction to Cilium
Linux Foundation via edX Introduction to Cilium - Part 2
Rawkode Academy via YouTube Introduction to Cilium - CNI Implementation for Kubernetes with eBPF
Rawkode Academy via YouTube Let's Go Triple Active with Three Clouds and Cilium
Devoxx via YouTube