mirror of https://github.com/istio/istio.io.git
Manual cherry-pick of 12994 (#13002)
* Manual cherry-pick of 12994 * fix keywords * Update content/en/blog/2023/network-security-splunk/index.md Co-authored-by: Eric Van Norman <ericvn@us.ibm.com> --------- Co-authored-by: Eric Van Norman <ericvn@us.ibm.com>
This commit is contained in:
parent
297be8d926
commit
ce3519d8dc
|
@ -2,7 +2,7 @@
|
|||
title: "Comprehensive Network Security at Splunk"
|
||||
description: "Security from Layer 3 to Layer 7 with Istio and more."
|
||||
publishdate: 2023-04-03
|
||||
attribution: "Bernard Van De Walle (Splunk), Mitch Connors (Aviatrix), ChatGPT"
|
||||
attribution: "Bernard Van De Walle (Splunk), Mitch Connors (Aviatrix)"
|
||||
keywords: [Istio,Security,Use Case]
|
||||
---
|
||||
|
||||
|
@ -67,4 +67,4 @@ Securing Splunk’s Cloud Native Network Stack while meeting the scalability nee
|
|||
|
||||
While applying identity, observability, and policy principles at every layer in the stack may appear redundant at first glance, each layer is able to make up for the shortcomings of the others, so that together these layers form a tight and effective barrier to unwanted access.
|
||||
|
||||
If you are interested in diving deeper into Splunk's Network Security Stack, you can watch our Cloud Native SecurityCon [presentation](https://youtu.be/OuRQnJKIEaM). This post was generated in part by ChatGPT summarizing a transcript of that presentation.
|
||||
If you are interested in diving deeper into Splunk's Network Security Stack, you can watch our Cloud Native SecurityCon [presentation](https://youtu.be/OuRQnJKIEaM).
|
||||
|
|
Loading…
Reference in New Issue