Linkedin

Activate mTLS in AWS App Mesh using AWS Private CA on Amazon EKS

Project Overview

Project Detail

This pattern shows how to implement Mutual Transport Layer Security (mTLS) on Amazon Web Services (AWS) using certificates from AWS Private Certificate Authority (AWS Private CA) in AWS App Mesh. It uses the Envoy secret discovery service (SDS) API through the Secure Production Identity Framework for Everyone (SPIFFE). SPIFFE is a Cloud Native Computing Foundation (CNCF) open-source project with wide community support that provides fine-grained and dynamic workload identity management. To implement SPIFFE standards, use the SPIRE SPIFFE runtime environment.

Using mTLS in App Mesh offers two-way peer authentication, because it adds a layer of security over TLS and allows services in the mesh to verify the client that’s making the connection. The client in the client-server relationship also provides an X.509 certificate during the session negotiation process. The server uses this certificate to identify and authenticate the client. This helps to verify if the certificate is issued by a trusted certificate authority (CA) and if the certificate is a valid one.

https://docs.aws.amazon.com/prescriptive-guidance/latest/patterns/activate-mtls-in-aws-app-mesh-using-aws-private-ca-on-amazon-eks.html?did=pg_card&trk=pg_card

To know more about this project connect with us

Activate mTLS in AWS App Mesh using AWS Private CA on Amazon EKS