Advanced Cloud Security Controls & Policy Enforcement
Apply traffic management policies to a microservices application in Google Kubernetes Engine and enforce authentication, authorization and audit using Istio Service Mesh.
- Protect a cloud native retail store application from external security risks, mitigate insider threats and reduce the risk of a data breach by ensuring that all communications between workloads are encrypted, mutually authenticated, and authorized.
Reduce security risks by defining a fully customized set of governance controls and ensuring continuous monitoring of environments to ensure the desired configuration is in place and there are no violations of governance controls.
Deploy an application into a Google Kubernetes Engine cluster and configure a network security policy to restrict access from a specified pod or from pods within a namespace.
Implement a deploy-time security control with Google Cloud Binary Authorization to ensure only trusted container images are deployed into a Google Kubernetes Engine cluster.