SecuritySecurity📄️ Adopt a zero trust network model for securityBest practices to adopt a zero trust network model to secure workloads and hosts. Learn 5 key requirements to control network access for cloud-native strategy. 📄️ Run Calico node as non-privileged and non-rootRun long-lived Calico components without root or system admin privileges. 🗃️ Get started with policy3 items 🗃️ Policy rules6 items 🗃️ Policy for hosts4 items 🗃️ Policy for services2 items 🗃️ Policy for Istio3 items 🗃️ Policy for extreme traffic2 items 📄️ Encrypt in-cluster pod trafficEnable WireGuard for state-of-the-art cryptographic security between pods for Calico clusters. 🗃️ Secure Calico component communications4 items