In this talk, we talk about API and Security. During this presentation, we will explain important aspects of security and how to apply these aspects using Service Mesh and API Gateway.
given development project, your APIs are treated as “first-class citizens.” That everything about a project revolves around the idea that the end product will be consumed by mobile devices, and that APIs will be consumed by client applications. Source: https://swagger.io/resources/articles/adopting-an-api-first-approach/
#2 Reduces the cost of developing apps #3 Increases the speed to market #4 Ensures good developer experiences Source: https://swagger.io/resources/articles/adopting-an-api-first-approach/
are whom they claim to be. This is the first step in any security process. Example: Employees in a company are required to authenticate through the network before accessing their company email
of giving the user permission to access a specific resource or function. In secure environments, authorization must always follow authentication. Example: After an employee successfully authenticates, the system determines what information the employees are allowed to access
of data security and is related to the proper handling of data. It is the process of check the ownership of the data! Example: After an employee successfully authenticates, the employee can only manipulate data that is yours.
• Different types of workloads • Integrate with Defense-in-depth concept • All elements in network is untrusted • All systems should get kind of grant before call others systems
account token is assigned to Istio Proxy 2. Pilot agent send Token and CSR to Istiod 3. Istiod validate k8s token 4. The istiod signs the certificate and provides it to pilot agent 5. The pilot agent calls Envoy SDS to configure it https://www.manning.com/books/istio-in-action