Spike Curtis
Senior Software Engineer, Tigera
Zero Trust Networks Come to Docker
Enterprise Kubernetes
Brent Salisbury
Software Alliance Engineer, Docker
Agenda
• Motivation for Zero Trust Networks
− Trends in application architecture
− Trends in threat landscape
− Deficiencies of the “Zone” model
• Building Zero Trust with Docker Enterprise, Calico & Istio
− Calico & Istio architecture
− DEMO!
• Conclusion, Q&A
Intra-Security Zone Traffic
Intra-Security Zone Traffic Hairpin
Cost Analysis
Inefficient Provisioning
Compute Provisioning
Distributing Policy Across Compute
Growing Attack Surface
Growing Attack Surface
Zero Trust Networking
The network is
always assumed to
be hostile
Zero Trust Networking
Zero Trust Networking
LAN
Zero Trust Networking
WAN
Zero Trust Networking
Internet
Zero Trust Networking
● Resilient against compromised devices,
workload, and network links
● Security is decoupled from network location
○ Simplified management
○ Flexible deployment
● VPNs are no longer needed
Zero Trust Networking
Advantages
Zero Trust Networking Software
Control Plane Data PlanePlatform
Calico & Istio Architecture
NodeNode
Pod
Workload
Istio
Citadel
Envoy
Felix
Pod
Workload Envoy
Felix
Mutual Authentication &
Encryption
Calico Policy
Dikastes Dikastes
IPTables IPTables
Demo Application
customer summary database
Q&A

DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes