📄️ Adopt a zero trust network model for security
Best practices to adopt a zero trust network model to secure workloads and hosts. Learn 5 key requirements to control network access for cloud-native strategy.
📄️ Run Calico node as non-privileged and non-root
Run long-lived Calico components without root or system admin privileges.
🗃️ Get started with policy
🗃️ Policy rules
🗃️ Policy for hosts
🗃️ Policy for services
🗃️ Policy for Istio
🗃️ Policy for extreme traffic
📄️ Encrypt in-cluster pod traffic
Enable WireGuard for state-of-the-art cryptographic security between pods for Calico clusters.
🗃️ Secure Calico component communications