Skip to content

Latest commit

 

History

History
73 lines (29 loc) · 3.77 KB

secure-development-in-the-kyma-environment-ff51a32.md

File metadata and controls

73 lines (29 loc) · 3.77 KB

Secure Development in the Kyma Environment

Secure development focuses on Pod security, network traffic restriction, Istio sidecar proxy injection, and workload exposure. Learn about the security measures you can take to improve the security of your Kyma environment .

To learn how to secure your Kubernetes Pods in Kyma, see Kubernetes Pod Security Recommendations.

To securely expose workloads in SAP BTP, Kyma runtime, use the Istio and API Gateway modules. As a prerequisite, make sure that you have those two modules added to your Kyma cluster. Then, perform the following tasks:

Serverless Module

For more information, see Security Considerations for the Serveless module.

Related Information

Kyma Security Concepts

Secure Administration and Operations in the Kyma Environment

Kubernetes Pod Security Recommendations