Using Calico Policies to Secure Kubernetes Traffic


Details
Join us this June at Investigo where we'll be discussing how to use Calico Network Policies to enhance the security of Kubernetes pod traffic!
Synopsis
This session focuses on enhancing the security of Kubernetes pod traffic through the use of Calico Network Policies.
It begins by highlighting the distinctions between legacy applications and cloud-native applications running on Kubernetes. While legacy applications are typically monolithic, cloud-native applications consist of independent microservices that communicate via network APIs. Unlike long-lived legacy workloads with static IP addresses, Kubernetes workloads are dynamic and ephemeral.
The session discusses the limitations of relying solely on the traditional network firewall approach to secure Kubernetes workloads. Opening large IP ranges between zones creates a false sense of security and increases the potential for lateral movement and compromise if any workload is compromised. To overcome these challenges, how teams can leverage Calico Network Policies as a framework for defining and enforcing authorized traffic between pods and services in Kubernetes. These policies provide fine-grained control over egress traffic, isolate workloads, optimize network performance, and ensure compliance with regulatory requirements.
Location: Investigo Office - 10 Bishops Square, London E1 6EG
Agenda:
6:00PM: Doors Open
6:15PM: Intros
6:30PM: Main Talk
RSVP to join us!
With thanks to our Gold Sponsors Prisma Cloud by Palo Alto Networks, Tigera and Apiiro for their continued support and to our event hosts Investigo!
Join the community:
Can't make it to the event? Keep up to date with our activities on LinkedIn & Twitter

Using Calico Policies to Secure Kubernetes Traffic