Kubernetes has made it easier to build cloud-native applications. However, this approach has broadened the network attack surface area. Advanced Layer-7 network security policy definition and enforcement are essential for reducing the attack surface and gaining granular layer-7 visibility and control of traffic among different services. Istio and its extensible approach towards interfacing with infrastructure backends make it easy to integrate advanced security checks for your cloud-native application.
In this session, we present a security adaptor for Istio’s Mixer that interfaces with layer-7 security policy management platforms and provides visibility, policy definition, and evaluation. Envoy does policy enforcement.
GCP Technology → https://bit.ly/2KbSx1j
Next ’19 Architecture Sessions here → https://bit.ly/Next19Architecture
Next ‘19 All Sessions playlist → https://bit.ly/Next19AllSessions
Subscribe to the GCP Channel → https://bit.ly/GCloudPlatform
Speaker(s): Ivan Bojer, Vinay Venkataraghavan
Session ID: ARC303
fullname:Issy Ben-Shaul,Joe Timmons;
Publisher: Google Cloud
You can watch this video also at the source.