YoVDO

Is Istio Ambient Mesh Secure - Exploring Service-to-Service Security

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Istio Courses Network Security Courses Multi-task Learning (MTL) Courses Kubernetes Security Courses Ambient Mesh Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security aspects of Istio Ambient Mesh in this 22-minute conference talk by Christian Posta from Solo.io and John Howard from Google. Delve into the architecture decisions made to preserve zero-trust properties in the sidecarless data plane implementation. Learn about mTLS, workload identity, and security boundaries between infrastructure and application worlds. Examine the secure overlay surface area, system boundaries, and blast radius boundaries. Understand the implications of compromised nodes, data planes, applications, and control planes. Discover the role of Waypoint Proxy and how it contributes to ease of operations in Istio Ambient Mesh.

Syllabus

Intro
Istio Ambient Mesh Data Plane
Sidecar architecture
Ambient architecture
Secure Overlay Surface Area
System Boundaries
Blast Radius Boundaries
Compromised node
Compromised data plane
Compromised application
Compromised control plane
Waypoint Proxy
Ease of Operations


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Hybrid Cloud Infrastructure Foundations with Anthos
Google Cloud via Coursera
Hybrid Cloud Service Mesh with Anthos
Google Cloud via Coursera
Architecting Hybrid Cloud Infrastructure with Anthos
Google Cloud via Coursera
Introduction to Containers, Kubernetes and OpenShift
IBM via edX
Managing Apps on Kubernetes with Istio
Pluralsight