Talk
Virtual
Zero trust for APIs: From edge to mesh with Istio
Edge security isn't enough. Internal traffic is often blindly trusted, making services vulnerable. This session shows how to build a Zero Trust API network with Istio, using JWTs and layered mesh controls to secure the entire request journey.
CEST
Meet the speakers
Kubernetes security is often built on the "castle-and-moat" fallacy. Teams harden the edge but leave internal east-west traffic implicitly trusted. In a world of Log4Shell-style zero-days, the perimeter is a myth. It is not a question of if a pod is breached, but when.
This talk examines zero trust using Istio Ambient Mode. It moves past the sidecar tax and explores a sidecar-less mesh that makes security more attainable. It deconstructs a real-world breach, showing how attackers steal pod identities and move laterally, then implements the three pillars of mesh security: identity via Ztunnel, authentication via JWT, and authorization via waypoint proxies.
