youtube image
From YouTube: 014 Istio and Gloo Mesh Security Model

Description

In this talk, we dig deeply into Istio's security policies including Authentication/Authorizations and how it works under the covers with Envoy proxy.