Security Best Practices

    If there are multiple service operators (a.k.a. SREs)deploying different services in a medium- or large-size cluster, we recommend creating a separate for each SRE team to isolate their access.For example, you can create a namespace for team1, and team2-ns namespace for team2, suchthat both teams cannot access each other’s services.

    Let us consider a three-tier application with three services: photo-frontend,photo-backend, and datastore. The photo SRE team manages the and photo-backend services while the datastore SRE teammanages the datastore service. The photo-frontend service can accessphoto-backend, and the photo-backend service can access datastore.However, the photo-frontend service cannot access .

    In this setup, Kubernetes can isolate the operator privileges on managing the services.Istio manages certificates and keys in all namespacesand enforces different access control rules to the services.