Demo

Zero-Trust Security With Kong Mesh

Event Ended

See how Kong Mesh enables zero-trust security between microservices with mutual TLS encryption, traffic permissions to restrict service-to-service communication, and Open Policy Agent policies for fine-grained authorization of service requests. We demonstrate encrypting all mesh traffic, blocking direct database access by locking down allowed traffic, then applying a policy to only permit GET operations on a service, enforcing secure service identities and least-privilege access.