Kubernetes Network Policy Manager

Centrally Manage all the Network Policies for your Kubernetes Infrastructure

Centralized management and visibility into your pod and namespace communication to ensure isolation boundaries and reduce the lateral attack surface fleet-wide, powered by Cilium.

Kubernetes Network Policy Automation, Standardization, and Governance Across Your Fleet of Clusters and Applications, Powered by Cilium

With Rafay, platform teams can configure enterprise-grade Kubernetes network isolation policies and enable developers to gain visibility into traffic flows.

Satisfy security and organizational compliance requirements for isolation and network access

Enable development teams to configure policies for namespace resources and reduce time to resolve issues

Prevent lateral movement and reduce attack surface within and across a fleet of clusters

Visibility Into Real-Time and Historical Network Traffic Flows For Developer Self-Service Based on Assigned Role

Rafay provides real-time network visibility and stores historical traffic flows for your specific namespaces and pods based on role. Enable developers to be self-reliant in debugging network communication flows for their applications while ensuring that platform teams are providing secure identity-based network visibility access based on user and role.

https://rafay.co/wp-content/uploads/2022/10/1-1.png

Isolate Communication Between Applications and Namespaces In Both Shared and Dedicated Cluster Environments

In order to reduce the lateral attack surface, Rafay allows you to build policies that can control ingress/egress traffic to clusters and isolate namespaces to implement a zero-trust model into your Kubernetes environments.

https://rafay.co/wp-content/uploads/2022/10/Screenshot-2-Cluster-Namespace-Policies-1-1.png

Enforce Network Policy Standards Cluster-Wide and at an Individual Namespace Level

In order to meet security and compliance requirements, it is critical for platform teams to enforce standards that can be met across the organization. For example, platform teams can enforce cluster-wide policies, such as default deny rules or namespace isolation, while leveraging RBAC to enable developers to apply policy rules for their applications that specify the traffic that is allowed to/from pods or namespaces.

https://rafay.co/wp-content/uploads/2022/10/Screenshot-3-Namespace-Policy-Placement-1-1.png

See the Network Policy Manager in Action!

 

 

Network Policy Management Service FAQs

What is the value with selecting Rafay over using open-source DIY tooling to manage and enforce network policies?

Rafay Network Policy Management service is fully integrated with Rafay’s platform. Not only does this solve for network security, but other parts of Kubernetes governance, including RBAC, deployment pipelines and infrastructure templates. Additionally, you can increase the reliability and reduce the operational cost with automated deployments, upgrades, and ongoing lifecycle management.

What specific use cases can be solved specifically by network policies?

Network policies can be used for workload protection to establish zero-trust and ensure that your applications are only communicating with what is required. In addition, network policies are great for running shared clusters. By creating namespace isolation rules, platform teams are presented with a lightweight option to segment different users and applications from each other during actual runtime.

What is the difference between OPA Gatekeeper and network policies?

OPA Gatekeeper is used as a validation engine to ensure that clusters and applications follow a standard protocol tied to configuration. In addition, this can be extended to ensure for example that all clusters have a default network policy.

Network policies meanwhile are used to protect workloads and isolate namespaces during runtime, very much like a firewall. An admin or developer creates network policies that allow/deny communication to other entities.

Download the White Paper
Best Practices for Securing Kubernetes

How to Apply Zero-Trust Principles to Secure Access to Kubernetes

"Easily operate and rapidly deploy applications anywhere across multi-cloud and edge environments."

Aamir Hussain

SVP Chief Product Officer, Verizon Business

"Rafay stood out from the crowd with their deep integration with Amazon EKS."

Jayant Thakre

VP Products

"The big draw was that you could centralize the lifecycle management & operations."

Beth Cohen

Cloud Technology Strategist, Verizon Business

"Rafay’s unified view for Kubernetes Operations & deep DevOps expertise has allowed us to significantly increase development velocity."

Alec Rooney

CTO

Blogs from the Kubernetes Current

Image for How Rafay Helps Sovereign & GPU Cloud Companies Accelerate Time to Market

How Rafay Helps Sovereign & GPU Cloud Companies Accelerate Time to Market

April 2, 2024 / by Haseeb Budhani

The Generative AI (GenAI) gold rush is in full swing, and a new use case is fast emerging globally: Sovereign Clouds for AI workloads, a.k.a. GPU Clouds. Why are GPU Clouds being born? It’s the data. The most curated and… Read More

Image for Resize and Right Size Applications on Kubernetes

Resize and Right Size Applications on Kubernetes

March 24, 2024 / by Mohan Atreya

It is a well understood fact on Kubernetes that there is a significant amount of wastage of expensive cloud/infrastructure because of over provisioned applications. In this blog, we will look at how app developers and platform teams can save their… Read More

Image for Choosing Between Amazon ECS and EKS

Choosing Between Amazon ECS and EKS

March 24, 2024 / by Mohan Atreya

We frequently get asked by users that are currently on AWS whether they should be using Amazon ECS or EKS to deploy and operate their containerized applications. Since this is such a common question and the answers are somewhat nuanced,… Read More