mirror of https://github.com/istio/istio.io.git
Add link to the slides to the intro blog post.
Update "hundreds of services" in the auth post to "millions of microservice endpoints".
This commit is contained in:
parent
d8dfebd436
commit
f6219e7843
|
@ -61,6 +61,8 @@ Istio is a completely open development project. Today we are releasing version 0
|
|||
|
||||
Visit [here](https://github.com/istio/istio/releases) to get the latest released bits.
|
||||
|
||||
View the [presentation]({{home}}/talks/istio_talk_gluecon_2017.pdf) from GlueCon 2017, where Istio was unveiled.
|
||||
|
||||
## Community
|
||||
|
||||
We are excited to see early commitment to support the project from many companies in the community: [Red Hat](https://blog.openshift.com/red-hat-istio-launch/) with Red Hat Openshift and OpenShift Application Runtimes, Pivotal with [Pivotal Cloud Foundry](https://content.pivotal.io/blog/pivotal-and-istio-advancing-the-ecosystem-for-microservices-in-the-enterprise), Weaveworks with [Weave Cloud](https://www.weave.works/blog/istio-weave-cloud) and Weave Net 2.0, [Tigera](https://www.projectcalico.org/welcoming-istio-to-the-kubernetes-networking-community) with the Project Calico Network Policy Engine and [Datawire](https://www.datawire.io/istio-and-datawire-ecosystem/) with the Ambassador project. We hope to see many more companies join us in this journey.
|
||||
|
|
|
@ -11,8 +11,8 @@ redirect_from: "/blog/0.1-auth.html"
|
|||
|
||||
Conventional network security approaches fail to address security threats to distributed applications deployed in dynamic production environments. Today, we describe how Istio Auth enables enterprises to transform their security posture from just protecting the edge to consistently securing all inter-service communications deep within their applications. With Istio Auth, developers and operators can protect services with sensitive data against unauthorized insider access and they can achieve this without any changes to the application code!
|
||||
|
||||
Istio Auth is the security component of the broader [Istio platform](https://istio.io/). It incorporates the learnings of securing hundreds of services
|
||||
in Google’s production environment.
|
||||
Istio Auth is the security component of the broader [Istio platform](https://istio.io/). It incorporates the learnings of securing millions of microservice
|
||||
endpoints in Google’s production environment.
|
||||
|
||||
<!--end_excerpt-->
|
||||
|
||||
|
@ -24,7 +24,8 @@ Thus, security administrators need a tool that enables them to consistently, and
|
|||
|
||||
## Solution: Strong service identity and authentication
|
||||
|
||||
Google has, over the years, developed architecture and technology to uniformly secure hundreds of services in its production environment against external
|
||||
Google has, over the years, developed architecture and technology to uniformly secure millions of microservice endpoints in its production environment against
|
||||
external
|
||||
attacks and insider threats. Key security principles include trusting the endpoints and not the network, strong mutual authentication based on service identity and service level authorization. Istio Auth is based on the same principles.
|
||||
|
||||
The version 0.1 release of Istio Auth runs on Kubernetes and provides the following features:
|
||||
|
|
Loading…
Reference in New Issue