youtube image
From YouTube: 018 Guide to Securing Your Kubernetes Workloads with the Istio Service Mesh

Description

Istio has many powerful security features for protecting your applications from malicious actors inside and outside of your network. Users rely on Istio features to meet various compliance standards designed for protection of sensitive data environments. These include encryption, authentication, authorization, monitoring tools, and control of ingress and egress traffic. Unfortunately, enabling and using these features is not as simple as clicking a checkbox. Configuring these policies correctly requires a deeper understanding of default behaviors, installation settings and the Istio CRDs. Failure to configure properly can result in data breaches or unintended behaviors. In this session, you will get an overview of the basics, out of the box functionality, and relevant Istio CRDs. In addition, you learn best practice guidelines for incrementally adopting these features and tools you can use to validate your security posture.