Network controls and segmentation methods allow you to control, segregate, and visualize Kubernetes traffic. These methods help you isolate tenants and better secure communications flow between containerized applications and microservices.
August is “Network Controls” month in Red Hat’s monthly Security series! Since March 2021, the Red Hat Security Ecosystem team has published monthly articles and videos on DevOps Security topics to help you learn how Red Hat can help you master the practice called DevSecOps.
By explaining how to assemble Red Hat products and introducing our security ecosystem partners, we aim to aid in your journey to deploying a comprehensive DevSecOps solution.
Network controls defined
Network controls are typically implemented in a running Kubernetes cluster, and the goal is to provide a defense-in-depth approach to protect Kubernetes network traffic. The following security methods make up the Network Controls category:
-
CNI / SDN: Software-defined networking (SDN), which provides a programmable, adaptable network fabric that is provisioned in real-time to support dynamic networking security requirements and is typically implemented with a container networking interface (CNI).
-
Network Policies: control traffic flows at the IP address or port level, and can be enhanced with cluster ingress and egress traffic controls, logging and network visualization.
-
Ingress, Egress Traffic Controls: provide protection of network traffic within a running cluster between pods.
-
Hardening Service Mesh: includes network segmentation, authentication and authorization for containerized applications and microservices.
-
Network Visualization: provides a graphical user interface showing the network traffic and relationships in order to control and identify suspicious activity.
-
Packet Analysis: capturing live pod network traffic to typically debug issues in the communication between services.
-
API Management: controlling access to APIs and securing API traffic.
Network controls integrated in DevSecOps
As pictured in the DevSecOps framework below, network controls integrations are typically found on the right side of the DevSecOps life cycle in a running cluster. The table that follows details some, but not all, of the common integrations to consider for network controls.
Integration Point |
Description |
Build Automation |
While most network controls are integrated in the running cluster, Kubernetes Network Policies provide an Infrastructure-as-code (IaC) approach to network configuration, which is key to adopting DevSecOps. Adding Network Policies within a GitOps and CI/CD process allows you to know who has access to what, audit changes and manage network policy drift. |
Container Orchestration |
Network Policies and CNI plugins help to set up Kubernetes networking during pod creation. |
Running Cluster |
Implementing network controls in the running cluster is the key integration for this category in order to achieve the defined features in each security method above. Some benefits include controlling access to endpoints outside of your Kubernetes cluster, automating compliance checks, monitoring all traffic within your cluster, and alerting on suspicious activity. Proper network controls configurations will also help provide a Zero Trust Architecture approach to networking, which assumes networks and network traffic is untrusted by default. Both Red Hat and our Security ISV Ecosystem provide capabilities in this category to add to a defense-in-depth approach to DevSecOps. |
Enhance and extend Network Controls with Red Hat partners
Combining Red Hat OpenShift Container Platform Network Control features with Red Hat’s certified ecosystem security partners can help your organization's DevSecOps practice.
If you are looking to enhance and extend Red Hat’s security capabilities in Network Controls, take a look at the following Red Hat Partners:
-
Aqua Security free trial and Operator.
-
Palo Alto Prisma Cloud Compute Edition and webinar.
-
Sysdig free trial and webinar.
-
Tigera Calico Enterprise and Operator.
For more information, visit "Modernize and secure applications with DevSecOps," or begin your discussion with us on enhancing container security and adopting DevSecOps. For similar blog posts on Red Hat’s DevSecOps Framework, search for previous months’ categories (Data Controls, Compliance, Identity and Access and Application Analysis) and stay tuned for upcoming posts.
Sobre el autor
Dave Meurer currently serves as a Principal Solution Architect on the Red Hat Global Partner Security ISV team, where he owns technical relationships and evangelism with security independent software vendor partners of Red Hat. Before joining Red Hat, he spent nine years in the Application Security industry with Synopsys and Black Duck, where he served in similar roles as the director of technical alliances and sales engineering.
Meurer also worked for Skyway Software, HSN.com, and Accenture in various management and application development roles. When he’s not thinking about Kubernetes, security, and partners, he enjoys being the VP Sales of North Central Tampa for his wife (the CEO) and 5 kids (Inside Sales).
Navegar por canal
Automatización
Conozca lo último en la plataforma de automatización que abarca tecnología, equipos y entornos
Inteligencia artificial
Descubra las actualizaciones en las plataformas que permiten a los clientes ejecutar cargas de trabajo de inteligecia artificial en cualquier lugar
Servicios de nube
Conozca más sobre nuestra cartera de servicios gestionados en la nube
Seguridad
Vea las últimas novedades sobre cómo reducimos los riesgos en entornos y tecnologías
Edge computing
Conozca las actualizaciones en las plataformas que simplifican las operaciones en el edge
Infraestructura
Vea las últimas novedades sobre la plataforma Linux empresarial líder en el mundo
Aplicaciones
Conozca nuestras soluciones para abordar los desafíos más complejos de las aplicaciones
Programas originales
Vea historias divertidas de creadores y líderes en tecnología empresarial
Productos
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Servicios de nube
- Ver todos los productos
Herramientas
- Training y Certificación
- Mi cuenta
- Recursos para desarrolladores
- Soporte al cliente
- Calculador de valor Red Hat
- Red Hat Ecosystem Catalog
- Busque un partner
Realice pruebas, compras y ventas
Comunicarse
- Comuníquese con la oficina de ventas
- Comuníquese con el servicio al cliente
- Comuníquese con Red Hat Training
- Redes sociales
Acerca de Red Hat
Somos el proveedor líder a nivel mundial de soluciones empresariales de código abierto, incluyendo Linux, cloud, contenedores y Kubernetes. Ofrecemos soluciones reforzadas, las cuales permiten que las empresas trabajen en distintas plataformas y entornos con facilidad, desde el centro de datos principal hasta el extremo de la red.
Seleccionar idioma
Red Hat legal and privacy links
- Acerca de Red Hat
- Oportunidades de empleo
- Eventos
- Sedes
- Póngase en contacto con Red Hat
- Blog de Red Hat
- Diversidad, igualdad e inclusión
- Cool Stuff Store
- Red Hat Summit