Introduction to Illumio Segmentation for Containers
Modern applications increasingly rely on containers and orchestrators like Kubernetes and OpenShift to deliver scalable, resilient services. While these platforms offer agility, they also introduce security challenges. Because containers share the same underlying OS kernel and communicate frequently, a single compromised container can lead to lateral movement across the environment. Illumio addresses these challenges with a container-native segmentation solution that provides visibility and control across dynamic environments.
Containers and Orchestrators
Containers are lightweight, portable units that package applications with their dependencies. Containers allow large applications to be broken into smaller, more manageable parts. Containers run isolated processes using the host operating system kernel, making them faster and more resource-efficient than virtual machines.
Orchestrators such as Kubernetes and OpenShift manage container lifecycles, health, networking, and scaling. Examples of orchestrators include:
Kubernetes
Open-source, cloud-native container orchestrator developed by Google and common in the public cloud that manages workloads via nodes, pods, services, and namespaces.
OpenShift
Enterprise-ready product and platform often deployed in on-prem data centers and the cloud built on Kubernetes by Red Hat. It adds enhanced Role-Based Access Control (RBAC), developer tools, and CI/CD features.
Amazon Elastic Kubernetes Service (EKS)
Azure Kubernetes Service (AKS)
Google Kubernetes Engine (GKE)
Illumio Segmentation for Containers Components
Illumio Segmentation for Containers extends segmentation to containerized environments. It secures workloads across Kubernetes, OpenShift, virtual machines, and bare-metal servers. Illumio Segmentation for Containers integrates directly with Kubernetes clusters using two key components:
C-VEN (Containerized Virtual Enforcement Node)
C-VEN deploys as a DaemonSet on each node. It enforces security policies at the node and pod levels by using iptables or nftables. Each node requires only one C-VEN.
Kubelink
Kubelink runs as a single pod in each cluster. It synchronizes Kubernetes metadata such as pods, services, and namespaces with Illumio’s Policy Compute Engine (PCE). Kubelink enables real-time traffic mapping and policy delivery. It automatically discovers nodes, network details, and services and sends that information to the PCE.
Benefits of Illumio Segmentation for Containers
Unify security for containers, securing workloads across Kubernetes, OpenShift, VMs, and bare metal
Gain visibility and control with real-time application traffic insight
Work across environments like on-prem, hybrid, or cloud-native container deployments
Deploy with Helm, performing installation and upgrades via Helm Charts on cloud-managed and self-managed clusters
How It Works
Visibility
C-VEN captures traffic flows, while Kubelink maps them to workloads. This data is visualized in Illumio.
Deployment
C-VEN and Kubelink are deployed via Helm Chart together, for installation and upgrades.
Policy Enforcement
Policies are applied at the pod level using iptables or nftables. Pods are treated as single workload units in the PCE.
Illumio Segmentation for Containers Use Cases
Kubernetes node visibility and control
Illumio provides visualization and inventory for all container nodes, segmenting at the node level.
Application tier-to-tier segmentation
Illumio enables controlling communication between services. For example, you can control communication flow from web, to application, to database.
Namespace isolation
Illumio helps prevent cross-talk between namespaces and enforces environment boundaries. For example, you can control flow from production environments to development environments.
Ingress traffic control
Illumio secures access through ingress controllers or load balancers, to only allow sanctioned entry points.
Egress traffic control
Illumio enables restricting pods from reaching external or internet destinations by enforcing Fully Qualified Domain Names (FQDNs) and IP-based allowlists, with label-based policies that clearly define intent. Illumio enforces on both pod egress and external server ingress. The pod gets IPs of the external server in egress rules. The external server gets the IPs of the Kubernetes nodes in ingress rule.
Kubernetes infrastructure protection
Illumio can limit access to Kubernetes API and control plane components to harden clusters against lateral movement attacks.
Intra-cluster communication
Illumio provides policy granularity, controlling communication between pods in the same namespace or across namespaces.