SlideShare a Scribd company logo
Spike Curtis
Senior Software Engineer, Tigera
Zero Trust Networks Come to Docker
Enterprise Kubernetes
Brent Salisbury
Software Alliance Engineer, Docker
Agenda
• Motivation for Zero Trust Networks
− Trends in application architecture
− Trends in threat landscape
− Deficiencies of the “Zone” model
• Building Zero Trust with Docker Enterprise, Calico & Istio
− Calico & Istio architecture
− DEMO!
• Conclusion, Q&A
Intra-Security Zone Traffic
Intra-Security Zone Traffic Hairpin
Cost Analysis
Inefficient Provisioning
Compute Provisioning
Distributing Policy Across Compute
Growing Attack Surface
Growing Attack Surface
Zero Trust Networking
The network is
always assumed to
be hostile
Zero Trust Networking
Zero Trust Networking
LAN
Zero Trust Networking
WAN
Zero Trust Networking
Internet
Zero Trust Networking
● Resilient against compromised devices,
workload, and network links
● Security is decoupled from network location
○ Simplified management
○ Flexible deployment
● VPNs are no longer needed
Zero Trust Networking
Advantages
Zero Trust Networking Software
Control Plane Data PlanePlatform
Calico & Istio Architecture
NodeNode
Pod
Workload
Istio
Citadel
Envoy
Felix
Pod
Workload Envoy
Felix
Mutual Authentication &
Encryption
Calico Policy
Dikastes Dikastes
IPTables IPTables
Demo Application
customer summary database
Q&A

More Related Content

PDF
DCSF 19 Mitigating Legacy Windows Operating System Vulnerabilities with Docke...
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
PDF
Shifting security left simplifying security for k8s open shift environments
PDF
Automate Your Container Deployments Securely
PPTX
CDK - The next big thing - Quang Phuong
PPTX
DockerCon EU 2017 - General Session Day 1
PDF
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...
DCSF 19 Mitigating Legacy Windows Operating System Vulnerabilities with Docke...
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Shifting security left simplifying security for k8s open shift environments
Automate Your Container Deployments Securely
CDK - The next big thing - Quang Phuong
DockerCon EU 2017 - General Session Day 1
CSTA - Cisco Security Technical Alliances, New Ecosystem Program Built on the...

What's hot (19)

PDF
Enabling Fast IT using Containers, Microservices and DAVROS models: an overview
PDF
Using Kubernetes to make cellular data plans cheaper for 50M users
PPTX
Enabling application portability with the greatest of ease!
PDF
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
PPTX
TechWiseTV Workshop: Cisco CloudCenter (CliQr)
PDF
Migrating .NET Apps to CF, A Strategy for Enterprises
PDF
Your Application Deserves Better than Kubernetes Ingress: Istio vs. Kubernetes
PDF
F5 Cloud Solutions
PDF
Cloud Native Security: New Approach for a New Reality
PPT
Cloud native
PPTX
SOCstock 2021 The Cloud-native SOC
PPTX
building microservices
PDF
Securing Your Cloud Transformation
PPTX
Discover the benefits of Kubernetes to host a SaaS solution
PPTX
The Journey to Becoming Cloud Native – A Three Step Path to Modernizing Appli...
PDF
Security as an Accelerator for Cloud Adoption
PDF
Azure F5 Solutions
PDF
Why modern cloud infrastructure require automation
PDF
Docker adventures in Continuous Delivery - Alex Vranceanu
Enabling Fast IT using Containers, Microservices and DAVROS models: an overview
Using Kubernetes to make cellular data plans cheaper for 50M users
Enabling application portability with the greatest of ease!
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
TechWiseTV Workshop: Cisco CloudCenter (CliQr)
Migrating .NET Apps to CF, A Strategy for Enterprises
Your Application Deserves Better than Kubernetes Ingress: Istio vs. Kubernetes
F5 Cloud Solutions
Cloud Native Security: New Approach for a New Reality
Cloud native
SOCstock 2021 The Cloud-native SOC
building microservices
Securing Your Cloud Transformation
Discover the benefits of Kubernetes to host a SaaS solution
The Journey to Becoming Cloud Native – A Three Step Path to Modernizing Appli...
Security as an Accelerator for Cloud Adoption
Azure F5 Solutions
Why modern cloud infrastructure require automation
Docker adventures in Continuous Delivery - Alex Vranceanu
Ad

Similar to DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes (20)

PDF
Cloud Security: Perception Vs. Reality
PDF
Sangfor's Presentation.pdf
PDF
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
PPTX
How Cloud Computing will change how you and your team will run IT
PPTX
Network Security Architecture
PPTX
SeattleFall1
PPTX
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
PPTX
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
PDF
Introduction of Cloudflare Solution for Mobile Payment
PDF
Reducing Cost with DNA Automation
PPTX
#PCMVision: VMware NSX - Transforming Security
 
PDF
2021 01-27 reducing risk of ransomware webinar
PDF
DPDK Architecture Musings - Andy Harvey
PDF
Cisco Secure Firewall Test Drive Presentation
PDF
Thinking about SDN and whether it is the right approach for your organization?
PDF
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
PDF
PDF
Introducing a Security Feedback Loop to your CI Pipelines
PDF
f5_synthesis_cisco_connect.pdf
Cloud Security: Perception Vs. Reality
Sangfor's Presentation.pdf
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
How Cloud Computing will change how you and your team will run IT
Network Security Architecture
SeattleFall1
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Introduction of Cloudflare Solution for Mobile Payment
Reducing Cost with DNA Automation
#PCMVision: VMware NSX - Transforming Security
 
2021 01-27 reducing risk of ransomware webinar
DPDK Architecture Musings - Andy Harvey
Cisco Secure Firewall Test Drive Presentation
Thinking about SDN and whether it is the right approach for your organization?
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Introducing a Security Feedback Loop to your CI Pipelines
f5_synthesis_cisco_connect.pdf
Ad

More from Docker, Inc. (20)

PDF
Containerize Your Game Server for the Best Multiplayer Experience
PDF
How to Improve Your Image Builds Using Advance Docker Build
PDF
Build & Deploy Multi-Container Applications to AWS
PDF
Securing Your Containerized Applications with NGINX
PDF
How To Build and Run Node Apps with Docker and Compose
PDF
Hands-on Helm
PDF
Distributed Deep Learning with Docker at Salesforce
PDF
The First 10M Pulls: Building The Official Curl Image for Docker Hub
PDF
Monitoring in a Microservices World
PDF
COVID-19 in Italy: How Docker is Helping the Biggest Italian IT Company Conti...
PDF
Predicting Space Weather with Docker
PDF
Become a Docker Power User With Microsoft Visual Studio Code
PDF
How to Use Mirroring and Caching to Optimize your Container Registry
PDF
Monolithic to Microservices + Docker = SDLC on Steroids!
PDF
Kubernetes at Datadog Scale
PDF
Labels, Labels, Labels
PDF
Using Docker Hub at Scale to Support Micro Focus' Delivery and Deployment Model
PDF
Build & Deploy Multi-Container Applications to AWS
PDF
From Fortran on the Desktop to Kubernetes in the Cloud: A Windows Migration S...
PDF
Developing with Docker for the Arm Architecture
Containerize Your Game Server for the Best Multiplayer Experience
How to Improve Your Image Builds Using Advance Docker Build
Build & Deploy Multi-Container Applications to AWS
Securing Your Containerized Applications with NGINX
How To Build and Run Node Apps with Docker and Compose
Hands-on Helm
Distributed Deep Learning with Docker at Salesforce
The First 10M Pulls: Building The Official Curl Image for Docker Hub
Monitoring in a Microservices World
COVID-19 in Italy: How Docker is Helping the Biggest Italian IT Company Conti...
Predicting Space Weather with Docker
Become a Docker Power User With Microsoft Visual Studio Code
How to Use Mirroring and Caching to Optimize your Container Registry
Monolithic to Microservices + Docker = SDLC on Steroids!
Kubernetes at Datadog Scale
Labels, Labels, Labels
Using Docker Hub at Scale to Support Micro Focus' Delivery and Deployment Model
Build & Deploy Multi-Container Applications to AWS
From Fortran on the Desktop to Kubernetes in the Cloud: A Windows Migration S...
Developing with Docker for the Arm Architecture

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
Advanced IT Governance
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Advanced IT Governance
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
GamePlan Trading System Review: Professional Trader's Honest Take

DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes