Secure development focuses on Pod security, network traffic restriction, Istio sidecar proxy injection, and workload exposure. Learn about the security measures you can take to improve the security of your Kyma environment .
To learn how to secure your Kubernetes Pods in Kyma, see Kubernetes Pod Security Recommendations.
-
Set up Kubernetes Network Policies to restrict the network traffic between Pods in your namespaces.
-
Enabling Istio Sidecar Proxy Injection for your namespaces.
To securely expose workloads in SAP BTP, Kyma runtime, use the Istio and API Gateway modules. As a prerequisite, make sure that you have those two modules added to your Kyma cluster. Then, perform the following tasks:
-
Disable the default gateway. See Disable or Enable Kyma Gateway.
-
Set up your own API gateway with one of the following options:
-
Create an APIRule Custom Resource to securely expose your workloads
For more information, see Security Considerations for the Serveless module.
Related Information
Secure Administration and Operations in the Kyma Environment