The word “trust” is simply not in the cybersecurity solution providers’ vocabulary. They trust no one and nothing. They develop Zero Trust network architectures to protect clients against external attacks, insider threats, and inadvertent errors that could impact security. And they’re always on the lookout for emerging vulnerabilities across internal and external networks. Trust is a luxury they can’t afford to have — or can they?
In February 2021, we announced the GA of Kong Konnect, the first cloud native service connectivity platform that gives organizations the flexibility of protecting their API and service traffic while simultaneously taking advantage of 10x ops improvements via the cloud control plane.
This blog will summarise the security architecture of a CDP Private Cloud Base cluster. The architecture reflects the four pillars of security engineering best practice, Perimeter, Data, Access and Visibility. The release of CDP Private Cloud Base has seen a number of significant enhancements to the security architecture including: Before diving into the technologies it is worth becoming familiar with the key security principle of a layered approach that facilitates defense in depth.