Network Policy Security Tutorials
- Identity-Aware and HTTP-Aware Policy Enforcement
- Locking Down External Access with DNS-Based Policies
- Inspecting TLS Encrypted Connections with Cilium
- Securing a Kafka Cluster
- Securing gRPC
- Securing Elasticsearch
- Securing a Cassandra Database
- Securing Memcached
- Locking Down External Access Using AWS Metadata
- Creating Policies from Verdicts
- Setup Cilium
- Deploy the Demo Application
- Enable Policy Audit Mode (Entire Daemon)
- Enable Policy Audit Mode (Specific Endpoint)
- Observe policy verdicts
- Create the Network Policy
- Disable Policy Audit Mode (Entire Daemon)
- Disable Policy Audit Mode (Specific Endpoint)
- Verify Policy Audit Mode Is Disabled
- Clean-up
- Host Firewall