Upgrade to Pro — share decks privately, control downloads, hide ads and more …

vs istio security

vs istio security

はい、なんとなくシュッとまとめたつもり

nwiizo

May 14, 2019
Tweet

More Decks by nwiizo

Other Decks in Technology

Transcript

  1. # iptables -A INPUT –s 10.0.0.0/8 -j ACCEPT # iptables

    -A INPUT -s 172.16.0.0/12 -j ACCEPT # iptables -A INPUT -s 192.168.0.0/16 -j ACCEPT
  2. ⚫ ⚫ ⚫ ⚫ ⚫ by Doug Barth, Evan Gilman

    Publisher: O'Reilly Media, Inc. Release Date: July 2017 Topic: Network Security
  3. ⚫ ⚫ ⚫ Figure 1-1. Traditional network security architecture Figure

    1-1. Traditional network security architecture ⚫ ⚫
  4. https://istio.io/docs/concepts/security/ ⚫  ⚫  ⚫  ⚫  ⚫

     Istio Security Architecture ⚫  ⚫  ⚫ 
  5. See also https://istio.io/docs/tasks/security/authz-tcp/ Shows how to set up role-based access

    control for TCP services. https://istio.io/docs/tasks/security/authz-http/ Shows how to set up role-based access control for HTTP services. https://istio.io/docs/tasks/security/authz-permissive/ Shows how to use Authorization permissive mode. https://istio.io/blog/2018/istio-authorization/ Describe Istio's authorization feature and how to use it in various use cases. https://istio.io/help/ops/security/debugging-authorization/ Demonstrates how to debug authorization. https://istio.io/docs/tasks/security/rbac-groups/ Tutorial on how to configure the groups-base authorization and configure the authorization of list-typed claims in Istio.