YoVDO

(Almost) Secure by Default - Next Steps for Hardening Istio in Production Environments

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Istio Courses Multi-task Learning (MTL) Courses Cloud Security Courses Service Mesh Courses Kubernetes Security Courses Defense in Depth Courses Container Security Courses Microservices Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore crucial security considerations and potential attack vectors when using Istio in production environments through this informative conference talk. Discover how to achieve a zero-trust and defense-in-depth architecture by taking additional steps to lock down your service mesh. Learn about mitigating risks and enhancing overall system security by integrating Istio with Network Policies, third-party Kubernetes tools, and cloud-provided security offerings such as key management services, firewalls, and policy enforcement engines. Gain valuable insights into fully hardening your Istio setup, addressing concerns about mTLS protection, self-signed root certificates, common misconfigurations, and adequate layers of defense. Walk away with practical knowledge on implementing a more robust security posture for your Kubernetes and Istio deployments.

Syllabus

(Almost) Secure by Default - Next Steps for Hardening Istio in Production... - Niranjan Shankar


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera