Главная
Study mode:
on
1
Intro
2
Istio Ambient Mesh Data Plane
3
Sidecar architecture
4
Ambient architecture
5
Secure Overlay Surface Area
6
System Boundaries
7
Blast Radius Boundaries
8
Compromised node
9
Compromised data plane
10
Compromised application
11
Compromised control plane
12
Waypoint Proxy
13
Ease of Operations
Description:
Explore the security aspects of Istio Ambient Mesh in this 22-minute conference talk by Christian Posta from Solo.io and John Howard from Google. Delve into the architecture decisions made to preserve zero-trust properties in the sidecarless data plane implementation. Learn about mTLS, workload identity, and security boundaries between infrastructure and application worlds. Examine the secure overlay surface area, system boundaries, and blast radius boundaries. Understand the implications of compromised nodes, data planes, applications, and control planes. Discover the role of Waypoint Proxy and how it contributes to ease of operations in Istio Ambient Mesh.

Is Istio Ambient Mesh Secure - Exploring Service-to-Service Security

CNCF [Cloud Native Computing Foundation]
Add to list
0:00 / 0:00