aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Engineering

How Anthos Helps Improve Your Platform And Application Security And Governance

  • aster.cloud
  • February 16, 2023
  • 4 minute read

Security has become a critical component in every modern application and platform today. As IT admins try to implement security policies required to protect applications across distributed platforms, they often run into issues such as the lack of effective policy enforcement and lack of visibility into the policy violations. In addition, whenever there is a platform policy change, application operators struggle to figure out the cause of the issues due to the lack of effective policy monitoring capabilities for live deployments.

Anthos is a secure container application platform that runs both on premises and in public clouds, with integrated and easy-to-operationalize security features connected to a centralized control plane in the Google Cloud. Anthos automates policy and security for Kubernetes clusters. Anthos Config Sync reconciles the state of clusters with one or more Git repositories. Policy Controller enables the enforcement of fully programmable policies for your clusters. These features, along with Anthos Service Mesh (ASM) and the Anthos Security dashboard (in Preview), work together to address the security and governance pain points, and help admins and developers to strengthen both the platform and application security posture.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Let’s walk through an example of how to use Anthos to securely deploy an Online Boutique Shop app and apply centralized policies at the same time. The application consists of a number of key services such as frontend, cartservice, checkout service and so on.

Putting your application operator hat on, imagine you want to enable secure service communications, monitor the overall health of the services, create a service-level objective (SLO) alert for your “frontend” service, and drill down to the “cartservice” to troubleshoot a customer issue. ASM can help you do all of the above. It can help simplify service delivery across the board, from traffic management to the compressive mesh telemetry. ASM can also help you embrace a Zero Trust security model. You can manage authentication, authorization, encryption, and communication between services, with little or no changes to the application itself.

Read More  Activision Blizzard And Google Enter Into Multi-year Strategic Relationship To Power New Player Experiences

Many security administrators want to be able to enforce policies across the platform and audit and eliminate any violations. Security admins want to have centralized governance at scale instead of manually configuring every cluster in their inventory running in the cloud and on-prem.

To achieve the above goals, we recommend first creating policies with the Anthos Policy Controller, which is based on the open source Open Policy Agent Gatekeeper project, and comes with a full library of pre-built policies for common security and compliance controls. Policy Controller also comes with out-of-the-box policy bundles that can audit the clusters against pre-built Kubernetes standards, industry standards, and Google Cloud’s recommended best practices.

Policy Controller can also enforce the clusters’ compliance using objects called constraints. For example, you can create a constraint to make sure all the services in the application have sidecar proxies injection so that the application’s health can be monitored easily. Another example of a constraint is to enforce the traffic encryption with strict mTLS so that all the communications among your application services are secure.

Once the constraints have been created, you can sync them to the clusters with Config Sync. Config Sync can help teams to collaborate with a GitOps model to speed up the overall development cycle. It also can help users apply multiple policy layers. For example, some policies can be applied at the organization level while the others can be applied to a specific namespace.

Figure 1 is a snapshot of the Anthos policy dashboard with seven constraints applied to the Anthos cluster, enforcing policies like strict mTLS and sidecar proxy injection in all the services of the online shop app.

Read More  Meet Ashish Vengsarkar, Tackling Some Of Google Cloud’s Most Complex Challenges By Day And Building New York Times Crosswords In His Free Time

Figure 1: Anthos Policy Controller dashboard

You can also just audit a policy without enforcing it. The Policy Controller dashboard shows you a centralized view for all the violations happening across your fleet of clusters and helps take any action if needed. For example, you can enforce granular access control for services so that only designated resources can access each application service. Figure 2 and Figure 3 indicate that there is one policy violation for the application — the istio-system doesn’t have a default deny authorization policy. You can give specific services granular access control to fix the issue so that the red alert in the policy violations dashboard goes away.

Figure 2: An example of the policy violation case displayed in the Anthos policy dashboard

Figure 3: An example of the policy violation details via the kubectl command query

In addition to providing continuous audit, Anthos Policy Controller also analyzes resource configurations during the CI/CD cycle. This provides valuable feedback during the process of configuration changes, and ensures any non-compliant changes are caught early in the pipeline. The Binary Authorization feature is another useful Anthos security feature. This deploy-time security control ensures only trusted container images are deployed on production clusters. You can require images to be signed by trusted authorities during the development process and then enforce signature validation when deploying.

Finally, the Anthos Security dashboard provides a fleet-wide view for your Kubernetes network security, binary authorization and mesh policies such as mTLS and authorization based policies, as in Figure 4. Figure 5 shows a more detailed view of workloads’ security configurations that can help improve your security posture.

Read More  Welcome To Security Voices

Figure 4: Anthos Security dashboard’s policy summary overview

Figure 5: Anthos Security dashboard’s policy audit page for the online shop application

Google Cloud has powerful security features built in at every level that work separately and together to protect customers’ platform from dangerous exploits. To learn more about how Anthos helps you modernize apps and infrastructure in place, and ensure consistent governance and security achieved at-scale, check out the website here.

Additional resources

  1. Explore the tutorial to learn how to strengthen your application’s security with Anthos
  2. Learn more about Google Kubernete Engine and Anthos
  3. Check out the exciting announcements and sessions from Google Cloud NEXT 2022

By: Lisa Shen (Senior Product Manager) and Ninad Desai (Group Product Manager)
Source: Google Cloud Blog


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Anthos
  • Google Cloud
  • Security
You May Also Like
View Post
  • Engineering
  • Technology

Guide: Our top four AI Hypercomputer use cases, reference architectures and tutorials

  • March 9, 2025
View Post
  • Computing
  • Engineering

Why a decades old architecture decision is impeding the power of AI computing

  • February 19, 2025
View Post
  • Engineering
  • Software Engineering

This Month in Julia World

  • January 17, 2025
View Post
  • Engineering
  • Software Engineering

Google Summer of Code 2025 is here!

  • January 17, 2025
View Post
  • Data
  • Engineering

Hiding in Plain Site: Attackers Sneaking Malware into Images on Websites

  • January 16, 2025
View Post
  • Computing
  • Design
  • Engineering
  • Technology

Here’s why it’s important to build long-term cryptographic resilience

  • December 24, 2024
IBM and Ferrari Premium Partner
View Post
  • Data
  • Engineering

IBM Selected as Official Fan Engagement and Data Analytics Partner for Scuderia Ferrari HP

  • November 7, 2024
View Post
  • Engineering

Transforming the Developer Experience for Every Engineering Role

  • July 14, 2024

Stay Connected!
LATEST
  • college-of-cardinals-2025 1
    The Definitive Who’s Who of the 2025 Papal Conclave
    • May 7, 2025
  • conclave-poster-black-smoke 2
    The World Is Revalidating Itself
    • May 6, 2025
  • 3
    Conclave: How A New Pope Is Chosen
    • April 25, 2025
  • Getting things done makes her feel amazing 4
    Nurturing Minds in the Digital Revolution
    • April 25, 2025
  • 5
    AI is automating our jobs – but values need to change if we are to be liberated by it
    • April 17, 2025
  • 6
    Canonical Releases Ubuntu 25.04 Plucky Puffin
    • April 17, 2025
  • 7
    United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services
    • April 15, 2025
  • 8
    Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology
    • April 2, 2025
  • 9
    IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management
    • March 27, 2025
  • 10
    Tariffs, Trump, and Other Things That Start With T – They’re Not The Problem, It’s How We Use Them
    • March 25, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    IBM contributes key open-source projects to Linux Foundation to advance AI community participation
    • March 22, 2025
  • 2
    Co-op mode: New partners driving the future of gaming with AI
    • March 22, 2025
  • 3
    Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience
    • March 10, 2025
  • PiPiPi 4
    The Unexpected Pi-Fect Deals This March 14
    • March 13, 2025
  • Nintendo Switch Deals on Amazon 5
    10 Physical Nintendo Switch Game Deals on MAR10 Day!
    • March 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.