Security overview
Review steps that you can take to make the following Gloo Mesh and service mesh components more secure.
- Gloo Mesh Enterprise components
- Service mesh traffic
- User access
- Your applications
- Underlying infrastructure
Videos
Review the following videos related to security in Gloo Mesh Enterprise.
Zero trust video
Learn how to use Gloo Mesh Enterprise to enforce a zero-trust model for your services. First, workspaces define realistic boundaries between your services. Then, Gloo can translate custom resources automatically into Istio AuthorizationPolicy, PeerAuthentication, and Sidecar objects to simplify managing your network security.
Secure egress traffic video
Learn how Gloo Mesh Enterprise uses both Istio and Cilium (or any other CNI) to secure Kubernetes egress traffic. A CNI network policy can prevent pods from bypassing the egress gateway. The egress gateway can perform TLS origination and apply advanced L7 policies, such as to allow only GET requests.