0

Integrating Calico and Istio to Secure Zero-Trust Networks on Kubernetes

by Carlo GutierrezNovember 8, 2018
While Calico removes network complexities and provides simple policy language, Istio ensures consistence and encrypts connections with mutual TLS.

Networks without trust

The concept of zero-trust networking (ZTN) was introduced in 2010. At the core, the ZTN model means not allowing access to anyone unless they are authenticated and their request to a specific network resource has been authorized. ZTN builds on the following principles:

  • Networks should always be assumed to be hostile.
  • External and internal threats exist on the network at all times.
  • Network locality is not sufficient for gaining trust.
  • Every device, user, and workflow should be authenticated and authorized.
  • Network policies must be dynamic and calculated from as many sources of data as possible.

While ZTN can offer better security—as all traffic needs to be verified—it can also be a challenge to adapt. At a recent Kubernetes meetup held in San Francisco, Andrew Randall of Tigera illustrated how the combination of Istio and Calico can work together to ensure security for zero-trust networking on Kubernetes.

Andrew Randall at the Kubernetes meetup

 

How can Calico and Istio help?

Calico is an open-source project designed to remove the complexities surrounding traditional software-defined networks and securing them through simple policy language in YAML. Calico is compatible with major cloud platforms, such as Kubernetes, OpenStack, Amazon Web Services, and Google Compute Engine.

An exemplary policy using label-based expressions (Image credit)

Calico’s implementation of the Kubernetes Network Policy API enables granular selection and grouping. Policies are configured based on Kubernetes labels.

“If you’re trying to establish trust, just the fact that someone else is on the same network as you is not sufficient to say you trust them.” —Andrew Randall, Tigera

These policies allow users to restrict access to specific services and separate development from production workloads. Policies are also dynamically updated through a distributed algorithm that determines what rules are required on each node in a cluster.

“Calico’s network policy API allows you to define at a granular level—based on fundamental Kubernetes concepts like labels—how you’re going to allow connections between workloads in your cluster.” —Andrew Randall, Tigera

On the other hand, Istio, another open-source project, resides on the concept of a service mesh by installing an Envoy sidecar proxy as close as possible to an application. This enables management of both the proxy and the application. Recently, we’ve written about using Istio and service mesh to achieve uniformity across microservices deployed to Kubernetes.

Example application of Istio (Image credit)

In the context of security, Istio provides authentication and encryption through mutual TLS—where both client and server use certificates to verify identity—and cryptographic certificates issued to each serviceAccount. More importantly, Istio ensures that security is implemented in a consistent way across an application.

“Rather than implementing mutual TLS in the application, with Istio you drop in a sidecar into every pod and that takes care of encrypting the connections using mutual TLS.” —Andrew Randall, Tigera

 

Think business. Kubernetes enablement.

Integrating Calico and Istio

On August 18, 2018, Calico v3.2 was released. This combined Calico’s application layer policy with Istio to enable authentication and authorization of network traffic using varying parameters.

A sample architecture of Istio and Calico (Image credit)

“We take the network policy and apply that to the Istio proxy layer, as well. There’s an authorization API within Envoy, and it allows us to read the policies right there in the proxy as it’s managing the traffic going through. The key value here for the user is there isn’t a separate place they have to go to find Istio connectivity rules from the network policy connectivity rules.” —Andrew Randall, Tigera

By integrating both Calico and Istio, the network policy language can be extended to include serviceAccounts. This way, validation is done through both network identity and cryptographic certificate.

Network policy for serviceAccounts (Image credit)

“I’m validating on both the network identity and the identity based on this certificate. Another endpoint can exfiltrate that certificate and try to connect, but if it doesn’t have the same network identity, it’s not going to get through. Equally, another endpoint can spoof the IP address of a valid client, but if it doesn’t have a certificate, it’s not going through.”
—Andrew Randall, Tigera

Kubernetes labels can also be used in the network policy language.

A sample network policy for service account labels (Image credit)

The network policy can also be configured to include a combination of attributes. For very strict policy controls, even connection methods can be defined.

“You’ve got super fine-grained rules, which are all about locking down connectivity to just what should be allowed.” —Andrew Randall, Tigera

Andrew Randall talking about ZTN

Calico v3.3 was released on October 22, 2018. The project’s progress can be tracked in its GitHub repo.

 

Tigera’s enterprise solution

At the end of the presentation, Andrew showed a snippet of the Tigera Secure Enterprise Edition—a platform that uses Calico and Istio under the hood to enable a ZTN model for enterprises. The solution removes the need to manually code network polices by using GUIs and other visual aids for traffic and security management.

Policies in Tigera Secure Enteprise Edition dashboard (Image credit)

The Tigera Secure Enterprise Edition also provides visibility and traceability by logging all network traffic between microservices and applications. Furthermore, it can be configured to automatically quarantine workloads that are acting irregularly, as well as can send alerts for inspection.

Tigera Secure Enteprise Edition tracks overall network statistics (Image credit)

Organizations with strict compliance and regulatory requirements can benefit from Tigera’s audit logs. These contain a detailed history of security controls and also include changes to security policies.

As can be seen, though Istio and Calico secure each specific layers of a network, the combination of both technologies can be handy for Kubernetes deployments.

 

Want details? Watch the video!

Table of contents

  1. What is zero-trust networking? (2’00”)
  2. How does Calico help to achieve zero-trust security? (4’50”)
  3. How does Istio comply with the ZTN model? (7’58”)
  4. What new features are available in Calico v3.2? (13’00”)
  5. How does Tigera Secure Enterprise Edition incorporate the combination of Calico and Istio? (16’55”)
  6. Questions and answers (21’02”)

 

These are the slides by Andrew.

 

Related video

At the meetup, Simone Morellato of VMware delivered a demo of the company’s container solutions for Kubernetes.

 

Further reading

 

About the expert

Andrew Randall is Co-founder and VP of Business Development at Tigera. He drives relationships with the company’s ecosystem partners, including the major public cloud providers and Kubernetes vendors, by ensuring they maintain a leadership position in the community, deliver integrated solutions, partner effectively in the field to drive joint deals, and collaborate effectively to provide joined-up support to joint customers. Andrew is passionate about technology and believes successful businesses deliver solutions and services that delight customers, the open-source community, and ecosystem partners.

Which Kubernetes topics you're impatient to read about?









Thank you for your response!
Interested in how to effectively use the Kuberneres CLI to manage your deployment? Download our kubectl cheat sheet!

To stay tuned with the latest updates, subscribe to our blog or follow @altoros.

  •  
  •  
  •  
454