Introducing Istio resources
Istio’s custom resources provide powerful features to your cluster and each one could take up a chapter by itself.
In this section, we want to provide enough details so you will have a strong understanding of each object. After the object overview, we will deploy a basic application that will demonstrate many of the objects in a real-world application example.
Authorization policies
Authorization policies are optional; however, if you do not create any, all requests to resources will be allowed access to your cluster workloads. This may be the desired default action for some organizations, but most enterprises should deploy workloads based on the least required privileges. This means that you should only allow what access is required for accessing the application – nothing more and nothing less. Least privilege access is often overlooked by organizations since it adds some complexity to access and if not configured correctly, it...