Skip to content

Overview

The Network Policy service is an out-of-the-box offering that allows platform teams and developers to build zero-trust network security into their Kubernetes environments without sacrificing governance, access control and performance. Some of the key advantages of this solution include:

  • Standardized installation and deployment of network policies across a fleet of clusters via blueprinting including the ability to define defaults to enable a Day 0 zero trust model
  • Assignment of policies to multiple levels of infrastructure including clusters and namespaces and ability to fine-tune based on application needs

Network Policy Overview

Using the console, API, RCTL, or GitOps, an admin can create network policies of the following types:

  • Cluster: these policies are scoped at the cluster level and should be used to enforce default sets of rules across the cluster
  • Namespace: these policies are scoped at the namespace level and should be used to protect individual pods or applications in a given workspace

The creation of cluster-wide policies versus namespace policies have different workflows and require certain roles. See the RBAC section below to learn more. These policies can then be assigned to the appropriate assets and standardized across your project infrastructure.


Cilium Integration

Starting with the 2.6 release, a CNI agnostic approach is supported for network policy enforcement within the platform.

  • Network policy enforcement will be handled by the primary CNI in the cluster or any other plugin (like Cilium in chaining mode) installed as an add-on
  • Users have the flexibility to deploy their own add-on (like Cilium’s Hubble component) for visibility

Network Policy Enforcement Recommendations by Cluster Type and Primary CNI

Cluster Type Primary CNI Supported? Recommendation
AKS azure Yes Use Azure’s policy enforcement capability (OR) Deploy Cilium as custom add-on in chaining mode
calico Yes Use Calico’s policy enforcement capability (OR) Deploy Cilium as custom add-on in chaining mode
kubenet No No
azure-cni-overlay Yes Use azure-cni-overlay with cilium as dataplane (OR) Deploy Cilium as custom add-on in chaining mode
EKS aws-cni Yes Use aws-cni’s policy enforcement capability (OR) Deploy Cilium as custom add-on in chaining mode
calico Yes Use Calico’s policy enforcement capability (OR) Deploy Cilium as custom add-on in chaining mode
MKS calico Yes Use Calico’s policy enforcement capability (OR) Deploy Cilium as custom add-on in chaining mode
canal Yes Deploy Cilium as custom add-on in chaining mode
cilium Yes Use Cilium’s policy enforcement

To deploy Cilium as a custom add-on in chaining mode, refer Cilium in Chaining-Mode for Network Policy


RBAC

The following table lists the roles that can access specific components of the Network Policy Management Service.

Feature Roles
Cluster Network Policies Infra Admin, Org Admin
Namespace Network Policies Workspace Admin, Project Admin, Org Admin

For more information on what these roles do generally, see the roles documentation.