12 Securing microservices with Istio service mesh
This chapter covers
- Terminating TLS at the Istio Ingress gateway
- Securing service-to-service communications with mTLS in an Istio environment
- Securing service-to-service communications with JWT in an Istio environment
- Enforcing RBAC with Istio
- Managing keys in an Istio deployment
In chapter 6, we discussed how to secure service-to-service communications with certificates; and in chapter 7, we extended that discussion to use JWTs to secure service-to-service communications. Then in chapters 10 and 11, we discussed how to deploy a set of microservices as Docker containers in Kubernetes and to secure service-to-service communications with JWT over mTLS. In all of these cases, each microservice ...
Get Microservices Security in Action now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.