Security

Review steps that you can take to make the following Gloo and gateway components more secure.

Figure: Components in your cluster environment that you want to secure.
  1. Gloo Platform components
  2. Network traffic
  3. User access
  4. Your applications
  5. Underlying infrastructure