Security

📄️ Adopt a zero trust network model for securityBest practices to adopt a zero trust network model to secure workloads and hosts. Learn 5 key requirements to control network access for cloud-native strategy.

📄️ Run Calico node as non-privileged and non-rootRun long-lived Calico components without root or system admin privileges.

🗃️ Get started with policy3 items

🗃️ Policy rules6 items

🗃️ Policy for hosts4 items

🗃️ Policy for services2 items

🗃️ Policy for Istio3 items

🗃️ Policy for extreme traffic2 items

📄️ Encrypt in-cluster pod trafficEnable WireGuard for state-of-the-art cryptographic security between pods for Calico clusters.

🗃️ Secure Calico component communications4 items