Unlock instant, AI-driven research and patent intelligence for your innovation.

A kubernetes zero trust network security system and its implementation method

A network security system and network component technology, applied in the field of Kubernetes zero-trust network security system, can solve problems such as zero-trust network implementation methods that do not yet exist in Kubernetes

Active Publication Date: 2022-07-08
中国东盟信息港股份有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, there is no implementation method of zero trust network based on Kubernetes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kubernetes zero trust network security system and its implementation method
  • A kubernetes zero trust network security system and its implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0063] Unless expressly stated otherwise, throughout the specification and claims, the term "comprising" or its conjugations such as "comprising" or "comprising" and the like will be understood to include the stated elements or components, and Other elements or other components are not excluded.

[0064] like Figure 1-2 As shown, the present invention discloses a Kubernetes zero-trust network security system method, including: a resource manager (Resource Manager), a certificate engine (Cert Engine), a policy engine (Policy Engine), a sidecar component (Sidecar), traffic collection There are six core components in total, Traffic Collector and Trust Inferer. The six cores cooperate with Kubernetes' network components C...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Kubernetes zero-trust network security system and an implementation method thereof, belonging to the technical field of cloud computing. Including: the resource manager is used to continuously collect and process the information of all applications, services, containers, hosts and other infrastructure; the trust engine is used to dynamically evaluate the security level of access requests; the policy engine is used for policy management and rule distribution; The cart component is used to verify and score requests to and from pods; the traffic collector is used to collect cluster request information; the resource manager, certificate engine, policy engine, sidecar component, traffic collector, and trust engine and Kubernetes network components Calico and Etcd storage work together. The present invention can safely control both the Node and the Pod.

Description

technical field [0001] The invention belongs to the technical field of cloud computing, in particular to a Kubernetes zero-trust network security system and an implementation method thereof. Background technique [0002] With the continuous development of cloud computing, the technical architecture of IT infrastructure is undergoing drastic changes. Kubernetes reduces application development, management, deployment and operation and maintenance costs from a new perspective. Its architecture has become a rapid development, testing and deployment. The de facto standard for applications, deployed at scale in production environments and adopted by more and more companies. [0003] With the changes in the technical architecture of IT infrastructure, the traditional internal and external network boundaries have become blurred, and it is difficult to find a physical network security boundary. Enterprises cannot build security infrastructure based on the traditional boundary securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F9/455G06F9/445
CPCH04L9/3263G06F9/45558G06F9/44526G06F2009/45595G06F2009/45587
Inventor 韦克璐王志雄赵凯麟
Owner 中国东盟信息港股份有限公司