YoVDO

Leveraging Envoy for Micro-Segmentation Security Policies in Financial Services

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Envoy Courses WebAssembly Courses Istio Courses gRPC Courses Security Policies Courses JWT Authentication Courses AWS X-Ray Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk on implementing micro-segmentation-based security policies using Envoy. Learn how JPMorgan Chase leverages Envoy's routing capabilities and filters like JWT Authentication and External Authorization to manage complex security requirements across different zones. Discover the use of AWS X-Ray Tracer for enhanced observability and the implementation of token exchange using the External Processor filter with Golang gRPC. Understand how Envoy has become a strategic tool for operating in high-security environments, replacing custom proxy implementations and providing long-term viability for potential Istio adoption. Gain insights into the cost savings, improved performance, and maintainability achieved through this Envoy-centric approach, and its potential as an evolving pattern in broader organizational security architecture.

Syllabus

Introduction
Companywide security policy
Filter chain
UDS support
Challenges
WebAssembly


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Kubernetes: Microservices
LinkedIn Learning
Kubernetes: Microservices
LinkedIn Learning
Sidecar Proxy Pros and Cons - Explained by Example
Hussein Nasser via YouTube
What Is Service Mesh and How to Get Started With It - Mirantis Labs Tech Talks
Mirantis via YouTube
Understanding Microservices with Distributed Tracing
Strange Loop Conference via YouTube