Kubernetes and Istio as a Zero Trust Overlay
dc.contributor.advisor | Ciprian Popoviciu | |
dc.contributor.author | Roach, Collin | |
dc.contributor.committeeMember | Te-Shun Chou | |
dc.contributor.committeeMember | Biwu Yang | |
dc.contributor.committeeMember | John Pickard | |
dc.contributor.department | Technology Systems | |
dc.date.accessioned | 2025-06-05T17:25:54Z | |
dc.date.available | 2025-06-05T17:25:54Z | |
dc.date.created | 2025-05 | |
dc.date.issued | May 2025 | |
dc.date.submitted | May 2025 | |
dc.date.updated | 2025-05-22T21:14:53Z | |
dc.degree.college | College of Engineering and Technology | |
dc.degree.grantor | East Carolina University | |
dc.degree.major | MS-Network Technology | |
dc.degree.name | M.S. | |
dc.degree.program | MS-Network Technology | |
dc.description.abstract | The emergence of Zero Trust security frameworks led to multiple solutions proposed for creating dynamic, point-to-point overlays for the endpoints of an enterprise information technology (IT) fleet. Some of these solutions reuse old technologies such as virtual private networks (VPNs) and generic route encapsulation (GRE) tunnels which add significant overhead and come with scalability constraints. On the other hand, the rapid adoption of Cloud based services led to the development of hyperscale frameworks to support the creation and maintenance of dynamic overlays. For example, Istio is a management infrastructure that supports Kubernetes with respect to end-to-end authentication, authorization and secure resource connectivity of server instances in a cloud-based application. In application platforms, this is handled by tools such as Kubernetes which orchestrates workloads between nodes; Istio is a management platform that supports Kubernetes to handle end-to-end verification and authentication for these platforms. The objective of this research is to investigate the feasibility of using Istio as an end-point authentication and authorization mechanism combined with dynamic overlay management in support of a zero-trust deployment model. This implementation would adapt Istio to distributed endpoints rather than cloud compute resources used in a micro services application infrastructure. With Istio, traffic between endpoints was inspected at a central location where relevant policies are applied. With Istio, every endpoint was identified and verified while traffic to and from that endpoint is scrubbed and logged. Following a review of the current research on this topic, the conceptual model was presented, and the practical tests performed in support of the envisioned architecture. To test the alternative hypothesis, Istio’s ability to support cloud-based endpoints outside a Kubernetes infrastructure was evaluated. Then, Istio’s ability to support endpoints outside a cloud infrastructure was evaluated on devices such as a Raspberry Pi or a laptop encompassing both ARM and Intel-based processors. The impact of Kubernetes and Istio as a Zero Trust framework on intra-cluster communication was promising; however, Kubernetes and Istio experienced high latency during tests evaluating inter-cluster communications. Kubernetes and Istio can be used to effectively manage endpoint assets; however, it may not be ideal for all assets or scenarios. | |
dc.etdauthor.orcid | 0009-0009-9315-620X | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/10342/14032 | |
dc.language.iso | English | |
dc.publisher | East Carolina University | |
dc.subject | Information Technology | |
dc.title | Kubernetes and Istio as a Zero Trust Overlay | |
dc.type | Master's Thesis | |
dc.type.material | text |
Files
Original bundle
1 - 1 of 1