Understanding Istio’s best practices
When operating the Service Mesh, it is advised to assume that security threats will not just originate from outside of the organization’s security boundaries but also from within the security perimeter. You should always assume that networks are not impregnable and create security controls that can secure assets, even if network boundaries are breached. In this section, we will discuss some of the various attack vectors to be mindful of when implementing Service Mesh.
Examining attack vectors for the control plane
The following list shows common strategies for initiating attacks on the control plane:
- Causing configuration to deliberately make the control plane malfunction so that the Service Mesh becomes inoperable, thus impacting business-critical applications being managed by the mesh. This can also be a precursor to forthcoming attacks targeting Ingress or any other applications.
- Obtaining privileged access to...