How Authorization Policies Protect Your Services
In clusters running Istio Ambient Mesh, UDS‑Core enforces ingress network security using Istio ALLOW AuthorizationPolicies. These policies are automatically generated for each application package you define with a UDS Package resource.
This document explains what this means for you as an application developer and how to take full advantage of the built-in security model.
Key Takeaways
-
Ingress is denied by default. UDS Core only allows what you explicitly configure using
allow
andexpose
rules. -
AuthorizationPolicies are ALLOW-based, which means you must write DENY rules separately if you want to restrict internal traffic further.
-
Use
remoteServiceAccount
wherever possible. This provides the most secure and identity-based access control. -
Expose rules use gateways to control what traffic enters your application. You can choose between:
- Tenant Gateway (default)
- Admin Gateway (used only when absolutely necessary)
-
Monitoring ports are automatically secured using rules that only allow the
monitoring
namespace to scrape metrics.
Best Practices for Secure Configuration
1. Lock Down Ingress With allow
spec: network: allow: - direction: Ingress remoteNamespace: "external-app" remoteServiceAccount: "my-client" port: 8080
This ensures that only a workload running as this specific service account in another namespace can access your service.
2. Expose Your Service Safely
spec: network: expose: - port: 80 targetPort: 8080 gateway: Tenant
This exposes your service at port 80 through the tenant gateway and maps it to your app’s port 8080.
3. Enable Safe Monitoring
spec: monitor: - targetPort: 3000 selector: app.kubernetes.io/name: grafana
This creates a rule that allows only Prometheus (from the
monitoring
namespace) to scrape your service.
Authservice Guidance
If you’re using Authservice, be aware that it is only appropriate for simple access scenarios, such as:
- Protecting web UIs or dashboards
- Cases where access can be fully granted or denied with no granularity
How Istio Evaluates Policies
Istio checks DENY policies first, then ALLOW policies.
- The operator creates ALLOW policies to admit approved ingress traffic.
- You should create your own DENY policies for more fine-grained control.
More info: Istio Authorization Policy Evaluation
Summary
- Ingress is denied by default.
- You allow ingress by defining
allow
orexpose
rules in your UDS Package resource definition. - You can further tighten security using DENY policies.
- Use
remoteServiceAccount
for the strongest protection. - Authservice is good for simple cases only—use stronger methods for complex needs.