Guide to Implementing Network Security with Kubernetes

Guide to Implementing Network Security with Kubernetes

Published Feb 1, 2019

Kubernetes and the container-based, microservice applications it orchestrates have changed the way modern applications are designed, developed, and deployed. Kubernetes also requires a different approach to network security, because:

  • Workloads are ephemeral and dynamically orchestrated
  • IP address of containers and pods are ever changing and unpredictable
  • Microservices are more reliant on the network than traditional monolithic applications, creating a larger surface area for attacks

Traditional approaches to network security are no longer effective with Kubernetes. That’s why we created this step-by-step, technical guidebook: Guide to Implementing Network Security for Kubernetes.

We’re Tigera, the people behind the open source Project Calico. Our technology is the de-facto standard for Kubernetes network security and is embedded in all major cloud providers (AWS EKS, Azure AKS, Google GKE, IBM Cloud Kubernetes Service), embedded in Docker Enterprise and integrated with Red Hat OpenShift.

Tigera’s enterprise security solution, Tigera Secure Enterprise Edition (EE), includes security monitoring and forensic capabilities and compliance reporting tools for businesses that have internal and external compliance requirements.

This free, downloadable eBook will help you get network security configured, deployed, and implemented quickly and painlessly. It uses Project Calico for most basic configurations and shows you examples from Tigera Secure for more complex situations.

Get the White Paper