{"id":45570,"date":"2022-03-18T07:00:56","date_gmt":"2022-03-17T22:00:56","guid":{"rendered":"https:\/\/jirak.net\/wp\/microservices-security-pattern-in-kubernetes\/"},"modified":"2022-03-18T07:34:12","modified_gmt":"2022-03-17T22:34:12","slug":"microservices-security-pattern-in-kubernetes","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/microservices-security-pattern-in-kubernetes\/","title":{"rendered":"Microservices Security Pattern in Kubernetes"},"content":{"rendered":"<p>Microservices Security Pattern in Kubernetes<\/p>\n<p><em>This blog is the fourth in our five&#8209;part series about Kubernetes networking for Microservices March&nbsp;2022: <\/p>\n<ul>\n<li>Program overview: <a href=\"https:\/\/www.nginx.com\/blog\/microservices-march-2022-kubernetes-networking\/\">Microservices March 2022: Kubernetes Networking<\/a>\n<li>Unit 1: <a href=\"https:\/\/www.nginx.com\/blog\/microservices-march-architecting-kubernetes-clusters-for-high-traffic-websites\/\">Architecting Kubernetes Clusters for High&#8209;Traffic Websites<\/a><\/li>\n<li>Unit 2: <a href=\"https:\/\/www.nginx.com\/blog\/microservices-march-exposing-apis-in-kubernetes\/\">Exposing APIs in Kubernetes<\/a><\/li>\n<li>Unit 3: <strong>Microservices Security Pattern in Kubernetes<\/strong> (this post)<\/li>\n<li>Unit 4: Advanced Kubernetes Deployment Strategies (coming soon)<\/li>\n<\/ul>\n<p><\/em><\/p>\n<p><a href=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2022\/03\/Microservices-March-2022-unit-3_header.svg\"><img decoding=\"async\" src=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2022\/03\/Microservices-March-2022-unit-3_header.svg\" alt=\"\" class=\"aligncenter size-full wp-image-69072\" \/><\/a><\/p>\n<p>Mastering your north&#8209;south traffic is just the beginning&#8230;once your services start communicating within the cluster&nbsp;&ndash; a.k.a. east&#8209;west traffic&nbsp;&ndash; you have a whole new set of problems! Unit 3 answers the question <em>How do I secure my APIs and apps to be production&#8209;ready?<\/em><\/p>\n<p>Three activities guide you progressively from a high&#8209;level overview to practical application. We suggest you complete all three to get the best experience.<\/p>\n<ul>\n<li><a href=\"#watch-livestream\">Step 1: Watch the Livestream (1 Hour)<\/a><\/li>\n<li><a href=\"#deepen-knowledge\">Step 2: Deepen Your Knowledge (1&ndash;2 Hours)<\/a><\/li>\n<li><a href=\"#get-hands-on\">Step 3: Get Hands&#8209;On (1 Hour)<\/a><\/li>\n<\/ul>\n<h2 id=\"watch-livestream\">Step 1: Watch the Livestream (1 Hour)<\/h2>\n<p>Each Microservices March livestream provides a high&#8209;level overview of the topic featuring subject matter experts from <a target=\"_blank\" href=\"https:\/\/learnk8s.io\/\" rel=\"noopener noreferrer\">learnk8s<\/a> and NGINX. If you miss the live airing on <span>March 21 &ndash;<\/span> don\u2019t worry! You can catch it on demand.<\/p>\n<p>In this episode, we cover:<\/p>\n<ul>\n<li>The sidecar pattern<\/li>\n<li>Policies to make services more secure and resilient<\/li>\n<li>Service meshes<\/li>\n<li>Mutual TLS (mTLS)<\/li>\n<li><span>End-to-end encryption<\/span><\/li>\n<\/ul>\n<h2 id=\"deepen-knowledge\">Step 2: Deepen Your Knowledge (1&ndash;2 Hours)<\/h2>\n<p>We expect you\u2019ll have more questions after the livestream&nbsp;&ndash; that\u2019s why we curated a collection of relevant reading and videos. This Unit\u2019s deep dive covers how to secure your Kubernetes apps and APIs.<\/p>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-3\"><a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=Yf0nW3tXtqA\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2022\/03\/kubernetes-security-best-practices-livestream_featured.jpeg\" alt=\"\" width=\"500\" height=\"299\" class=\"aligncenter size-full wp-image-69074\" \/><\/a>\n<\/div>\n<div class=\"col-md-9\"><strong>Webinar | <a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=Yf0nW3tXtqA\" rel=\"noopener noreferrer\">Kubernetes Security&nbsp;&ndash; Best Practices and Thoughts from the Field<\/a><\/strong><br \/>\nIn this 35&#8209;minute livestream we look at security trends, transferring control over security to your Kubernetes environment, and the role of Kubernetes security in mitigating API breaches.\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-3\"><a href=\"https:\/\/www.nginx.com\/blog\/six-ways-to-secure-kubernetes-using-traffic-management-tools\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2021\/12\/six-ways-secure-Kubernetes_featured.png\" alt=\"\" width=\"1000\" height=\"600\" class=\"aligncenter size-full wp-image-68489\" \/><\/a>\n<\/div>\n<div class=\"col-md-9\"><strong>Blog | <a href=\"https:\/\/www.nginx.com\/blog\/six-ways-to-secure-kubernetes-using-traffic-management-tools\/\">Six Ways to Secure Kubernetes Using Traffic Management Tools<\/a><\/strong><br \/>\nOrganizations adopt Kubernetes for its promise of agility and cost savings. But when there are security incidents in a Kubernetes environment, <a target=\"_blank\" href=\"https:\/\/www.redhat.com\/rhdc\/managed-files\/cl-state-kubernetes-security-report-ebook-f29117-202106-en.pdf\" rel=\"noopener noreferrer\">most organizations pull their Kubernetes deployments out of production<\/a>. In this blog we address six common use cases that you can solve with an Ingress controller or service mesh while making a big impact on the security of your apps and APIs.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-3\"><a href=\"https:\/\/www.nginx.com\/blog\/seven-guidelines-implementing-zero-trust-in-kubernetes\/\"><img decoding=\"async\" src=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2022\/03\/guidelines-zero-trust-Kubernetes_featured.svg\" alt=\"\" class=\"aligncenter size-full wp-image-68993\" \/><\/a>\n<\/div>\n<div class=\"col-md-9\"><strong>Blog | <a href=\"https:\/\/www.nginx.com\/blog\/seven-guidelines-implementing-zero-trust-in-kubernetes\/\">Seven Guidelines for Implementing Zero Trust in Kubernetes<\/a><\/strong><br \/>\nDeploying Zero Trust for Kubernetes&#8209;powered infrastructure and applications can be challenging. This blog contains a set of guidelines for building a Zero Trust Architecture in Kubernetes.\n<\/div>\n<\/div>\n<\/div>\n<p>At this point you\u2019re probably also wondering about service meshes and whether they&#8217;re something your organization needs. <\/p>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-3\"><a href=\"https:\/\/www.nginx.com\/blog\/how-to-choose-a-service-mesh\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2021\/05\/NGINX-Service-Mesh-GA_featured.png\" alt=\"\" width=\"1000\" height=\"600\" class=\"aligncenter size-full wp-image-66540\" \/><\/a>\n<\/div>\n<div class=\"col-md-9\"><strong>Blog | <a href=\"https:\/\/www.nginx.com\/blog\/how-to-choose-a-service-mesh\/\">How to Choose a Service Mesh<\/a><\/strong><br \/>\nLearn how to determine whether you&#8217;re ready for a mesh and if so how to select one.\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-3\"><a href=\"https:\/\/www.nginx.com\/resources\/webinars\/are-you-service-mesh-ready-moving-from-consideration-to-implementation\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2021\/05\/wbr-service-mesh-ready_featured.png\" alt=\"\" width=\"1000\" height=\"600\" class=\"aligncenter size-full wp-image-66572\" \/><\/a>\n<\/div>\n<div class=\"col-md-9\"><strong>Webinar| <a href=\"https:\/\/www.nginx.com\/resources\/webinars\/are-you-service-mesh-ready-moving-from-consideration-to-implementation\/\">Are You Service Mesh Ready? Moving from Consideration to Implementation<\/a><\/strong><br \/>\nWatch this on&#8209;demand webinar for a discussion covering service mesh readiness, the importance of the data plane, and a demo of NGINX Service Mesh.\n<\/div>\n<\/div>\n<\/div>\n<h3>Bonus Research<\/h3>\n<p>If you\u2019re keen to deepen your knowledge on security and service mesh&nbsp;&ndash; and have more than 1&ndash;2 hours to spend&nbsp;&ndash; then we suggest three additional resources to get you started.<\/p>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-3\"><a href=\"https:\/\/www.nginx.com\/resources\/library\/web-application-security\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2020\/07\/ebk-ORM-Web-Application-Security-featured-500x300-1.png\" alt=\"\" width=\"500\" height=\"300\" class=\"aligncenter size-full wp-image-64532\" \/><\/a>\n<\/div>\n<div class=\"col-md-9\"><strong>eBook | <a href=\"https:\/\/www.nginx.com\/resources\/library\/web-application-security\/\">Web Application Security<\/a><\/strong><br \/>\nWhile many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking&nbsp;&ndash; until now. This guide discusses both offensive and defensive security concepts that software engineers can easily learn and apply.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-3\"><a href=\"https:\/\/www.nginx.com\/resources\/library\/the-enterprise-path-to-service-mesh-architectures\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2018\/08\/ORM-Enterprise-Path-featured-500x300@2x-1.png\" alt=\"\" width=\"1000\" height=\"600\" class=\"aligncenter size-full wp-image-65957\" \/><\/a>\n<\/div>\n<div class=\"col-md-9\"><strong>eBook | <a href=\"https:\/\/www.nginx.com\/resources\/library\/the-enterprise-path-to-service-mesh-architectures\/\">The Enterprise Path to Service Mesh Architectures<\/a><\/strong><br \/>\nThis practical eBook explains how a service mesh provides a configurable infrastructure layer that makes <span>service-to-service<\/span> communication flexible, reliable, and fast.\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-3\"><a href=\"https:\/\/www.nginx.com\/resources\/webinars\/kubernetes-nginx\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2020\/10\/2020-10-26-Get-the-Most-Out-of-K8s-with-NGINX-featured-500x300-1.png\" alt=\"\" width=\"500\" height=\"300\" class=\"aligncenter size-full wp-image-65277\" \/><\/a>\n<\/div>\n<div class=\"col-md-9\"><strong>Webinar | <a href=\"https:\/\/www.nginx.com\/resources\/webinars\/kubernetes-nginx\/\">Get the Most Out of Kubernetes with NGINX<\/a><\/strong><br \/>\nExplore the benefits of duplicating application services inside Kubernetes and look at some well\u2011established practices for deploying services such as WAF for applications that are running in Kubernetes. We cover trade&#8209;offs between different options and the criteria that matter most to help you make the best decisions.\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p><!-- t.mauro notes: this is a hack that's required for the href tags in the final row above to work properly. Without it, only the very top 5% of the thumbnail and the area _above_ the video title can be clicked on. Below that space the cursor turns back into a regular arrow. It's as if the technology that makes a link symbol appear when you hover over the following H2 is \"reaching up\" and claiming space above it. --><\/p>\n<h2 id=\"get-hands-on\">Step 3: Get Hands On (1 Hour)<\/h2>\n<p>Even with all the best webinars and research, there\u2019s nothing quite like getting your hands on the tech. The labs run you through common scenarios to reinforce your learning.<\/p>\n<p>In our third self&#8209;paced lab, <em>Protect Kubernetes Apps from SQL Injection<\/em>, you use NGINX as a sidecar to secure a pod and intercept unwanted east&#8209;west traffic.<\/p>\n<p>To access the lab, you need to <a href=\"https:\/\/www.nginx.com\/c\/microservices-march-2022-kubernetes-networking\/\">register<\/a> for Microservices March 2022. If you\u2019re already registered, the email you received with the Unit 3 Learning Guide includes access instructions. <\/p>\n<\/p>\n<h2>Why Register for Microservices March?<\/h2>\n<p>While some of the activities (the livestreams and blogs) are freely available, we need to collect just a little personal information to get you set up with the full experience. <a href=\"https:\/\/www.nginx.com\/c\/microservices-march-2022-kubernetes-networking\/\">Registration<\/a> gives you:<\/p>\n<ul>\n<li>Access to four self&#8209;paced labs where you can get hands&#8209;on with the tech via common scenarios<\/li>\n<li>Membership in the Microservices March Slack channel for asking questions of the experts and networking with fellow participants<\/li>\n<li>Weekly learning guides to help you stay on top of the agenda<\/li>\n<li>Calendar invites for the livestreams<\/li>\n<\/ul>\n<h2>What\u2019s Next?<\/h2>\n<p>Unit 4: <em>Advanced Kubernetes Deployment Strategies<\/em> begins on March&nbsp;28. Learn about zero&#8209;downtime deployments using tactics such as traffic splitting, blue&#8209;green deployments, tracing, and mapping traffic flow in real time.<\/p>\n<p><a href=\"https:\/\/www.nginx.com\/c\/microservices-march-2022-kubernetes-networking\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.nginx.com\/wp-content\/uploads\/2022\/03\/Microservices-March-2022-unit-3_footer.png\" alt=\"\" width=\"2049\" height=\"501\" class=\"aligncenter size-full wp-image-69071\" \/><\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.nginx.com\/blog\/microservices-march-microservices-security-pattern-in-kubernetes\/\">Microservices Security Pattern in Kubernetes<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.nginx.com\">NGINX<\/a>.<\/p>\n<p>Source: <a href=\"https:\/\/www.nginx.com\/blog\/microservices-march-microservices-security-pattern-in-kubernetes\/\" target=\"_blank\" rel=\"noopener\">Microservices Security Pattern in Kubernetes<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Microservices Security Pattern in Kubernetes This blog is the fourth in our five&#8209;part series about Kubernetes networking for Microservices March&nbsp;2022: Program overview: Microservices March 2022: Kubernetes Networking Unit 1: Architecting Kubernetes Clusters for High&#8209;Traffic Websites Unit 2: Exposing APIs in Kubernetes Unit 3: Microservices Security Pattern in Kubernetes (this post) Unit 4: Advanced Kubernetes Deployment Strategies (coming soon) Mastering your north&#8209;south traffic is just the beginning&#8230;once your services start communicating within the cluster&nbsp;&ndash; a.k.a. east&#8209;west traffic&nbsp;&ndash; you have a whole new set of problems! Unit 3 answers the question How do I secure my APIs and apps to be production&#8209;ready? Three activities guide you progressively from a high&#8209;level overview to practical application. We suggest you complete all three to get the best experience. Step 1: Watch the Livestream (1 Hour) Step 2: Deepen Your Knowledge (1&ndash;2 Hours) Step 3: Get <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/microservices-security-pattern-in-kubernetes\/\" title=\"Microservices Security Pattern in Kubernetes\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[652],"class_list":["post-45570","post","type-post","status-publish","format-standard","hentry","category-news","tag-nginx"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=45570"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45570\/revisions"}],"predecessor-version":[{"id":45571,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45570\/revisions\/45571"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=45570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=45570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=45570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}