Best Practices for Calico Security Policy Implementation in Kubernetes
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore best practices for implementing Calico security policies in Kubernetes environments in this 47-minute conference talk. Learn about the Kubernetes networking model, security challenges, and workload identity. Discover Calico security policy features, anatomy, and behavior. Gain insights into effective implementation strategies and examine various security policy patterns, including denylists, kube-dns, and tenant restrictions. Understand how to enforce default-deny policies for tenants and implement security policy governance. Explore Calico documentation and learn about Calico Enterprise and Calico Cloud offerings to enhance your Kubernetes security posture.
Syllabus
Intro
Kubernetes Networking Model
Security Challenges with Kubernetes
Workload Identity, Networking and Security
Security Policy Characteristics
Calico Security Policy Features
Anatomy of a Calico Security Policy
Security Policy Behavior
Best Practices for Security Policy Implementation
Example Security Policy Patterns
Security Policy - denylist
Security Policy - kube-dns
Security Policy - tenant-1-restrict
Security Policy - checkoutservice
Security Policy - yaobank
Security Policy - bookinfo
Enforce Default-Deny for Tenants
Security Policy Governance
Calico Documentation
Calico Enterprise and Calico Cloud
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Hot Topics in Containers, OpenStack, and HadoopRed Hat via YouTube Creating an IPv6-Only Kubernetes Cluster with Kubeadm and Calico
Rawkode Academy via YouTube Low Trust Edge Network - Performance and Security with Calico, VPP, and WireGuard
Linux Foundation via YouTube Calico/VPP: High-Performance Kubernetes Networking - LFN Webinar
Linux Foundation via YouTube Docker Container Networking - Kubernetes Orchestration and Application Connectivity
Docker via YouTube