Building a Secure and Maintainable PaaS
Building a Secure and Maintainable PaaS Leveraging eBPF to Scale Security and Improve Platform Support Bradley Whitfield October 28, 2020 2 Dragon - Internal Platform as a Service TIP: To change Requirements for Scaling Up TIP: To change picture:Right click on image > Replace image > Select file ❏ Secure Network Isolation ❏ Network Visibility and Auditing ❏ Minimize maintenance and performance overhead0 码力 | 20 页 | 2.26 MB | 1 年前3Secure your microservices with istio step by step
#IstioCon Secure your microservices with istio step by step JianFeng Ding, LuYao Zhong #IstioCon Agenda ● Istio identity ● mTLS in Isito ● Secure ingress traffic ● Authorize ingress traffic ● Authorize Authorize in mesh traffic ● Summary #IstioCon Istio Architecture Connect, secure, control, and observe services. #IstioCon Security Architecture #IstioCon Bookinfo architecture without service corresponding virtual service which configuring traffic routes Secure ingress gateway via TLS terminating Using ingress host and secure ingress port to send request: From curl command: need attaching0 码力 | 34 页 | 67.93 MB | 1 年前3Secure access to EC2 (for developers)
Golang Warsaw #56 Jakub Wołynko Secure access to EC2 (for developers) Agenda – introduction – EC2 in native environment – 3-tier architecture intro – alternative methods of resource connection: resource access – possibilities of disconnection resources from the internet – in general, more secure unfortunately... – architecture getting more complex – additional costs like VPN, NatGateway failure solution two - ssm – to be precise AWS System Manager Session Manager – sessions based on secure bi-directional channel – traffic is encrypted with TLS 1.2ssm - props and cons – connection can0 码力 | 10 页 | 3.11 MB | 5 月前3How HP set up secure and wise platform with Istio
#IstioCon How HP set up secure and wise platform with Istio John Zheng/ john.zheng@hp.com #IstioCon Agenda ➢ HP Horizon platform design with Istio ➢ Secure Platform ➢ Wise Platform ➢ Excellent Connect With Istio #IstioCon Secure Platform • JWT Verify • Mutual TLS • Authorization Policy • Envoy External Authorization #IstioCon Secure Platform #IstioCon Secure Platform – JWT Verify Using Using request authentication policy to Verify end-user JWT easily #IstioCon Secure Platform – mutual TLS Using mutual TLS for service-to-service authentication. • When a service receives or sends network0 码力 | 23 页 | 1.18 MB | 1 年前3Moxa Industrial Linux 3.0 (Debian 11) Manual for Arm-based Computers Version 1.0, January 2023
............................................................................................. 6 Secure and Standard Models ............................................................................ ............................................................................................ 65 Secure Boot and Disk Encryption ....................................................................... well as ensure system reliability and security. Secure and Standard Models MIL3 provides two security levels in the form of standard and secure models. The standard models come with the default Debian0 码力 | 111 页 | 2.94 MB | 1 年前3DBeaver Lite User Guide v24.2.ea
ea. Page 47 of 1010. Setting Description SSH Tunnel Configure an if your database requires a secure connection. SSH tunnel SOCKS Proxy Set up a SOCKS proxy if you need to route the connection through established. Connection Settings DBeaver Lite User Guide 24.2.ea. Page 71 of 1010. Overview Enabling secure password storage Administrator configuration of Master password policy Configuring Master password feature strengthens the security of DBeaver by encrypting credentials and sensitive data using a secure storage system. When you use the Master password feature: Isolated Security: Connection details0 码力 | 1010 页 | 79.48 MB | 1 年前3DBeaver Lite User Guide v.24.1
24.1. Page 47 of 1008. Setting Description SSH Tunnel Configure an if your database requires a secure connection. SSH tunnel SOCKS Proxy Set up a SOCKS proxy if you need to route the connection through established. Connection Settings DBeaver Lite User Guide 24.1. Page 71 of 1008. Overview Enabling secure password storage Administrator configuration of Master password policy Configuring Master password feature strengthens the security of DBeaver by encrypting credentials and sensitive data using a secure storage system. When you use the Master password feature: Isolated Security: Connection details0 码力 | 1008 页 | 79.40 MB | 1 年前3DBeaver Ultimate User Guide v.24.1
24.1. Page 49 of 1169. Setting Description SSH Tunnel Configure an if your database requires a secure connection. SSH tunnel SOCKS Proxy Set up a SOCKS proxy if you need to route the connection through established. Connection Settings DBeaver Ultimate User Guide 24.1. Page 73 of 1169. Overview Enabling secure password storage Administrator configuration of Master password policy Configuring Master password feature strengthens the security of DBeaver by encrypting credentials and sensitive data using a secure storage system. When you use the Master password feature: Isolated Security: Connection details0 码力 | 1169 页 | 94.41 MB | 1 年前3DBeaver Ultimate User Guide v24.2.ea
ea. Page 49 of 1171. Setting Description SSH Tunnel Configure an if your database requires a secure connection. SSH tunnel SOCKS Proxy Set up a SOCKS proxy if you need to route the connection through Connection Settings DBeaver Ultimate User Guide 24.2.ea. Page 73 of 1171. Overview Enabling secure password storage Administrator configuration of Master password policy Configuring Master password feature strengthens the security of DBeaver by encrypting credentials and sensitive data using a secure storage system. When you use the Master password feature: Isolated Security: Connection details0 码力 | 1171 页 | 94.65 MB | 1 年前3DBeaver User Guide v24.2.ea
ea. Page 49 of 1171. Setting Description SSH Tunnel Configure an if your database requires a secure connection. SSH tunnel SOCKS Proxy Set up a SOCKS proxy if you need to route the connection through feature is available in , , and editions only. Lite Enterprise Ultimate Team Overview Enabling secure password storage Administrator configuration of Master password policy Configuring Master password feature strengthens the security of DBeaver by encrypting credentials and sensitive data using a secure storage system. When you use the Master password feature: Isolated Security: Connection details0 码力 | 1171 页 | 94.79 MB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100