Workload Identity Part 1: Introduction to SPIFFE and SPIRE

Описание к видео Workload Identity Part 1: Introduction to SPIFFE and SPIRE

A workload is a single piece of software, deployed with a particular configuration for a single purpose; it may comprise multiple running instances of software, all of which perform the same task. A workload identity is a way for a workload to prove who it is and prove its authenticity to other workloads. Historically IP addresses were the standard way to identify workloads, however, in the modern and dynamic world of microservices and cloud architecture, IPs are no longer a practical method of identifying workloads. Additionally, managing a large number of workload identities across heterogeneous environments in a secure and timely manner is highly challenging. The Secure Production Identity Framework for Everyone (SPIFFE), is a set of open-source standards for creating workload identities that resolve the aforementioned challenges. SPIRE is a production-ready implementation of the SPIFFE APIs that performs node and workload attestation in order to securely issue workload identities. In this video, we will go over SPIFFE and SPIRE architecture.

Scripts: https://github.com/gary-RR/myYouTube_...

Timecodes
0:00 -Intro (Workload and Workload Identity).
4:02 -Introduction to Secure Production Identity Framework for Everyone (SPIFFE).
5:39 -SPIFFE Components.
9:28 -SPIFFE Runtime Environment(SPIRE) Architecture.
11:14 -SPIRE Server.
17:00 -SPIRE Agent.
18:57 -Complete SPIFFE/SPIRE Lifecycle Walkthrough and Visualization (Kubernetes environment focused).
31:52 -Demos.

My Other Videos:
► Encrypt Client Communication to Kubernetes Services Leveraging Cert-Manage and Let’s Encrypt
   • Encrypt Client Communication to Kuber...  
►Kubernetes Security, Part 4: Kubernetes Authentication (Part B: Open ID Connect Auth)
   • Kubernetes Security, Part 4: Kubernet...  
►Kubernetes Security, Part 3: Kubernetes Auth (Part A: Overview and X509 Client Certificate auth)
   • Kubernetes Security, Part 3: Kubernet...  
►Kubernetes Security, Part 2: Managing POD Run Time Security
   • Kubernetes Security, Part 2: Managing...  
► Istio Ambient Service Mesh
   • Istio Ambient Service Mesh  
► Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC) in Detail
   • Kubernetes Security, Part 1: Kubernet...  
► Cilium Service Mesh
   • Cilium Service Mesh  
► Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated)
   • Cilium Kubernetes CNI Provider: Part ...  
► Cilium Kubernetes CNI Provider, Part 3: Cluster Mesh
   • Cilium Kubernetes CNI Provider, Part ...  
►Cilium Kubernetes CNI Provider, Part 2: Security Policies and Observability Leveraging Hubble
   • Cilium Kubernetes CNI Provider, Part ...  
► Cilium Kubernetes CNI Provider, Part 1: Overview of eBPF and Cilium and the Installation Process    • Cilium Kubernetes CNI Provider, Part ...  
► What is VXLAN and How It is Used as an Overlay Network in Kubernetes?
   • What is VXLAN and How It is Used as a...  
► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 2- Join Linux Machines to AD:
   • Managing Linux Logins, Users, and Mac...  
► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 1- Setup AD:
   • Managing Linux Logins, Users, and Mac...  
► Sharing Resources between Windows and Linux:
   • Sharing Resources between Windows and...  
► Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive:
   • Kubernetes kube-proxy Modes: iptables...  
►Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets:
   • Kubernetes: Configuration as Data: En...  
►Configuring and Managing Storage in Kubernetes:
   • Configuring and Managing Storage (vol...  
► Istio Service Mesh – Securing Kubernetes Workloads:
   • Istio Service Mesh – Securing Kuberne...  
► Istio Service Mesh – Intro
   • Istio Service Mesh (sidecar-based)- I...  
► Understanding Kubernetes Networking. Part 6: Calico Network Policies:
   • Understanding Kubernetes Networking. ...  
► Understanding Kubernetes Networking. Part 5: Intro to Kubernetes Network Policies:
   • Understanding Kubernetes Networking. ...  
► Understanding Kubernetes Networking. Part 4: Kubernetes Services:
   • Kubernetes services - (Understanding ...  
► Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth:
   • Understanding Kubernetes Networking P...  
► Understanding Kubernetes Networking. Part 2: POD Network, CNI, and Flannel CNI: Plug-in:
   • Understanding Kubernetes Networking. ...  
►Understanding Kubernetes Networking. Part 1: Container Networking:
   • Видео  
► Setup a Linux-Windows (Calico based) Hybrid Kubernetes Cluster to Host .NET Containers:
   • Setup a Linux-Windows (Calico based) ...  
► A Docker and Kubernetes tutorial for beginners:
A Docker and Kubernetes tutorial for beginners. - YouTube
► Setup a "Docker-less" Multi-node Kubernetes Cluster on Ubuntu Server:
   • Setup a "Docker-less" Multi-node Kube...  
►Step by Step Instructions on Setting up Multi-Node Kubernetes Cluster on CentOS
   • Step by Step Instructions on Setting ...  
►Setup and Configure CentOS Linux Server on A Windows 10 Hypervisor
   • Setup and Configure CentOS Linux Serv...  

Комментарии

Информация по комментариям в разработке