Skip to content

Using Calico Policies to Secure Kubernetes Traffic

Photo of Steve G
Hosted By
Steve G. and 3 others
Using Calico Policies to Secure Kubernetes Traffic

Details

Join us this June at Investigo where we'll be discussing how to use Calico Network Policies to enhance the security of Kubernetes pod traffic!

Synopsis
This session focuses on enhancing the security of Kubernetes pod traffic through the use of Calico Network Policies.

It begins by highlighting the distinctions between legacy applications and cloud-native applications running on Kubernetes. While legacy applications are typically monolithic, cloud-native applications consist of independent microservices that communicate via network APIs. Unlike long-lived legacy workloads with static IP addresses, Kubernetes workloads are dynamic and ephemeral.

The session discusses the limitations of relying solely on the traditional network firewall approach to secure Kubernetes workloads. Opening large IP ranges between zones creates a false sense of security and increases the potential for lateral movement and compromise if any workload is compromised. To overcome these challenges, how teams can leverage Calico Network Policies as a framework for defining and enforcing authorized traffic between pods and services in Kubernetes. These policies provide fine-grained control over egress traffic, isolate workloads, optimize network performance, and ensure compliance with regulatory requirements.

Location: Investigo Office - 10 Bishops Square, London E1 6EG
Agenda:
6:00PM: Doors Open
6:15PM: Intros
6:30PM: Main Talk

RSVP to join us!
With thanks to our Gold Sponsors Prisma Cloud by Palo Alto Networks, Tigera and Apiiro for their continued support and to our event hosts Investigo!

Join the community:
Can't make it to the event? Keep up to date with our activities on LinkedIn & Twitter

Photo of DevSecOps - London Gathering group
DevSecOps - London Gathering
See more events
Investigo (part of The IN Group)
10 Bishops Square · London