Add link to the slides to the intro blog post.

Update "hundreds of services" in the auth post to "millions of microservice endpoints".
This commit is contained in:
Martin Taillefer 2017-05-25 16:52:11 -07:00
parent d8dfebd436
commit f6219e7843
2 changed files with 6 additions and 3 deletions

View File

@ -61,6 +61,8 @@ Istio is a completely open development project. Today we are releasing version 0
Visit [here](https://github.com/istio/istio/releases) to get the latest released bits.
View the [presentation]({{home}}/talks/istio_talk_gluecon_2017.pdf) from GlueCon 2017, where Istio was unveiled.
## Community
We are excited to see early commitment to support the project from many companies in the community: [Red Hat](https://blog.openshift.com/red-hat-istio-launch/) with Red Hat Openshift and OpenShift Application Runtimes, Pivotal with [Pivotal Cloud Foundry](https://content.pivotal.io/blog/pivotal-and-istio-advancing-the-ecosystem-for-microservices-in-the-enterprise), Weaveworks with [Weave Cloud](https://www.weave.works/blog/istio-weave-cloud) and Weave Net 2.0, [Tigera](https://www.projectcalico.org/welcoming-istio-to-the-kubernetes-networking-community) with the Project Calico Network Policy Engine and [Datawire](https://www.datawire.io/istio-and-datawire-ecosystem/) with the Ambassador project. We hope to see many more companies join us in this journey.

View File

@ -11,8 +11,8 @@ redirect_from: "/blog/0.1-auth.html"
Conventional network security approaches fail to address security threats to distributed applications deployed in dynamic production environments. Today, we describe how Istio Auth enables enterprises to transform their security posture from just protecting the edge to consistently securing all inter-service communications deep within their applications. With Istio Auth, developers and operators can protect services with sensitive data against unauthorized insider access and they can achieve this without any changes to the application code!
Istio Auth is the security component of the broader [Istio platform](https://istio.io/). It incorporates the learnings of securing hundreds of services
in Googles production environment.
Istio Auth is the security component of the broader [Istio platform](https://istio.io/). It incorporates the learnings of securing millions of microservice
endpoints in Googles production environment.
<!--end_excerpt-->
@ -24,7 +24,8 @@ Thus, security administrators need a tool that enables them to consistently, and
## Solution: Strong service identity and authentication
Google has, over the years, developed architecture and technology to uniformly secure hundreds of services in its production environment against external
Google has, over the years, developed architecture and technology to uniformly secure millions of microservice endpoints in its production environment against
external
attacks and insider threats. Key security principles include trusting the endpoints and not the network, strong mutual authentication based on service identity and service level authorization. Istio Auth is based on the same principles.
The version 0.1 release of Istio Auth runs on Kubernetes and provides the following features: