Security
📄️ Adopt a zero trust network model for security
Best practices to adopt a zero trust network model to secure workloads and hosts. Learn 5 key requirements to control network access for cloud-native strategy.
📄️ Run Calico node as non-privileged and non-root
Run long-lived Calico components without root or system admin privileges.
🗃️ Get started with policy
3 items
🗃️ Policy rules
6 items
🗃️ Policy for hosts
4 items
🗃️ Policy for services
2 items
🗃️ Policy for Istio
3 items
🗃️ Policy for extreme traffic
2 items
📄️ Encrypt in-cluster pod traffic
Enable WireGuard for state-of-the-art cryptographic security between pods for Calico clusters.
🗃️ Secure Calico component communications
4 items