Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Isolate namespaces using NetworkPolicy resources #1

Open
d3adb5 opened this issue Mar 27, 2024 · 0 comments
Open

Isolate namespaces using NetworkPolicy resources #1

d3adb5 opened this issue Mar 27, 2024 · 0 comments
Assignees
Labels
enhancement New feature or request

Comments

@d3adb5
Copy link
Owner

d3adb5 commented Mar 27, 2024

The cluster that sources its applications from this repository uses Calico as a CNI. Calico has support for the NetworkPolicy resource, allowing us to restrict access to and from groups of Pods and namespaces within the cluster.

It is good practice to isolate applications in the network to mitigate lateral movement should any of them be compromised.

@d3adb5 d3adb5 added this to Cloud Lab Mar 28, 2024
@d3adb5 d3adb5 moved this to Backlog in Cloud Lab Mar 28, 2024
@d3adb5 d3adb5 self-assigned this Mar 28, 2024
@d3adb5 d3adb5 added the enhancement New feature or request label Mar 28, 2024
@d3adb5 d3adb5 moved this from Backlog to Ready in Cloud Lab Mar 28, 2024
@d3adb5 d3adb5 moved this from Ready to Backlog in Cloud Lab Mar 28, 2024
@d3adb5 d3adb5 moved this from Backlog to In progress in Cloud Lab Mar 28, 2024
@d3adb5 d3adb5 moved this from In progress to Backlog in Cloud Lab Mar 28, 2024
@d3adb5 d3adb5 moved this from Backlog to In progress in Cloud Lab Jul 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
Status: In progress
Development

No branches or pull requests

1 participant