Skip to content

In this AKS-focused security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment.

Notifications You must be signed in to change notification settings

tigera-solutions/cc-aks-zero-trust-workshop

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

70 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Microsoft Azure: Hands-on AKS workshop
Implementing zero-trust security for containers

Welcome

In this AKS-focused workshop, you will work with Microsoft Azure and Calico Cloud to learn how implement zero-trust security for workloads to reduce the attack surface of applications running on AKS.

Cloud-native applications require a modern approach based on the zero-trust principles of identity-based access, least privilege access, and proactively detecting threats and reducing the blast radius in case of a breach.

Calico Cloud enables fine-grained, zero-trust workload access controls between your microservices and external databases, cloud services, APIs, and other applications. It also prevents the lateral movement of threats with identity-aware segmentation that works across all of your workload environments, including hosts, VMs, Kubernetes components, and services.

You will come away from this workshop with an understanding of how others in your industry are securing and observing cloud-native applications in Microsoft Azure, along with best practices that you can implement in your organization.

Time Requirements

The estimated time to complete this workshop is 60-90 minutes.

Target Audience

  • Cloud Professionals
  • DevSecOps Professional
  • Site Reliability Engineers (SRE)
  • Solutions Architects
  • Anyone interested in Calico Cloud :)

Learning Objectives

  1. Learn how to deploy zero-trust workload access controls with namespace isolation recommendations
  2. Extend firewall protection at the granular, workload level
  3. Block lateral movement of APTs with identity-aware microsegmentation
  4. Understand how to apply zero-trust security controls at application level.

Workshop Environment Preparation

Warning

For this workshop, you are expected to have access to a previously created AKS cluster.

  • Please, follow the instructions on the repository below if you don't have it ready:

    Calico Cloud on AKS - Workshop Environment Preparation

  • We will run this workshop from the Azure Cloud Shell, as described in that repository.

  • To start your cluster, reload the environment variables create in your Azure Cloud Shell first and then start the cluster. Use the following command:

    source ~/workshopvars.env
    az aks start --resource-group $RESOURCE_GROUP --name $CLUSTERNAME

Modules

This workshop is organized in sequential modules. One module will build up on top of the previous module, so please, follow the order as proposed below.

Module 1 - Connect the Azure AKS cluster to Calico Cloud
Module 2 - Zero-Trust Workload Access Control with Namespace Isolation Recommendation
Module 3 - Workload Isolation with Microsegmentation
Module 4 - Application Level Observability
Module 5 - Clean up

Useful links

Follow us on social media:

Note

The examples and sample code provided in this workshop are intended to be consumed as instructional content. These will help you understand how Calico Cloud can be configured to build a functional solution. These examples are not intended for use in production environments.

About

In this AKS-focused security workshop, you will work with Calico and Microsoft Azure experts to learn how to implement zero-trust security for workloads to reduce the attack surface of applications running on AKS. This 90-minute hands-on lab comes with your own Calico Cloud environment and a sample app environment.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published