Piotr Jabłoński: Istio's security policy breach | CONFidence

Описание к видео Piotr Jabłoński: Istio's security policy breach | CONFidence

Istio's security policy breach - the role of isolation in modern Cloud Native architectures

Cloud Native architectures are distributed with scalable functionalities supporting applications. However, it involves an increased level of system complexity, especially network and security.

This results in design and configuration errors that can be made unconsciously. The session refers to the role of isolation of the architectural components. As an example is Istio Ambient Mesh where I breached a security policy using DoS attack initialized from the application K8s pods targeted to the ztunnel component.

Come and find out what are the challenges and system limits awaiting for you and how to solve them.

More: https://confidence-conference.org/

Комментарии

Информация по комментариям в разработке