Securing Networks with Cilium
Note
The 2022 security audits for Cilium are available:
- Identity-Aware and HTTP-Aware Policy Enforcement
- Locking Down External Access with DNS-Based Policies
- Inspecting TLS Encrypted Connections with Cilium
- Securing a Kafka Cluster
- Securing gRPC
- Securing Elasticsearch
- Securing a Cassandra Database
- Securing Memcached
- Locking Down External Access Using AWS Metadata
- Creating Policies from Verdicts
- Setup Cilium
- Deploy the Demo Application
- Scale down the deathstar Deployment
- Enable Policy Audit Mode (Entire Daemon)
- Enable Policy Audit Mode (Specific Endpoint)
- Observe policy verdicts
- Create the Network Policy
- Disable Policy Audit Mode (Entire Daemon)
- Disable Policy Audit Mode (Specific Endpoint)
- Verify Policy Audit Mode is Disabled
- Clean-up
- Host Firewall
- Restricting privileged Cilium pod access