In this AKS-focused workshop, you will work with Azure and Calico Cloud to learn how implement network security for workloads to reduce the attack surface of applications running on AKS clusters.
Cloud-native applications require a modern approach based on the zero-trust principles of identity-based access, least privilege access, and proactively detecting threats and reducing the blast radius in case of a breach.
Calico Cloud enables fine-grained, secure workload access controls between your microservices and external databases, cloud services, APIs, and other applications. It also prevents the lateral movement of threats with identity-aware segmentation that works across all of your workload environments, including hosts, VMs, Kubernetes components, and services.
You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in Azure, along with best practices that you can implement in your organization.
The estimated time to complete this workshop is 60-90 minutes.
- Cloud Professionals
- DevSecOps Professional
- Site Reliability Engineers (SRE)
- Solutions Architects
- Anyone interested in Calico Cloud :)
- Learn how to deploy zero-trust workload access controls with namespace isolation recommendations
- Extend firewall protection at the granular, workload level
- Block lateral movement of APTs with identity-aware microsegmentation
- Understand how to apply zero-trust security controls at application level.
Warning
For this workshop, you are expected to have access to a previously created AKS cluster.
-
Please, follow the instructions on the repository below if you don't have it ready:
-
We will run this workshop from the Azure Cloud Shell, as described in that repository.
-
To start your cluster, reload the environment variables create in your Azure Cloud Shell first and then start the cluster. Use the following command:
source ~/workshopvars.env az aks start --resource-group $RESOURCE_GROUP --name $CLUSTERNAME
This workshop is organized in sequential modules. One module will build up on top of the previous module, so please, follow the order as proposed below.
Module 1 - Connect the AKS cluster to Calico Cloud
Module 2 - Workload Access Control with Namespace Isolation Recommendation
Module 3 - Blocking Lateral Movement with Microsegmentation
Module 4 - Ingress and Egress access control using NetworkSets
Module 5 - Application Level Observability
Module 6 - Clean up
- Project Calico
- Calico Academy - Get Calico Certified!
- O’REILLY EBOOK: Kubernetes security and observability
- Calico Users - Slack
Follow us on social media:
Note
The examples and sample code provided in this workshop are intended to be consumed as instructional content. These will help you understand how Calico Cloud can be configured to build a functional solution. These examples are not intended for use in production environments.