© Rahul Sharma, Avinash Singh 2020
R. Sharma, A. SinghGetting Started with Istio Service Meshhttps://doi.org/10.1007/978-1-4842-5458-5_9

9. Policies and Rules

Rahul Sharma1  and Avinash Singh2
(1)
Delhi, India
(2)
Gurgaon, Haryana, India
 

Application security is challenge in a microservice architecture. Developers build business process microservices in various languages. All these applications must be secured with the proper authentication and authorization. Most enterprises have one way of doing authentication and authorization. In this chapter, we will discuss the security features provided in Istio. Previously we saw that every Istio feature is driven by the Envoy proxy. Security is no exception to this. Istio provides security features using the ...

Get Getting Started with Istio Service Mesh: Manage Microservices in Kubernetes now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.