In addition to the various base features that are available out-of-the box in Enterprise Security Package (ESP), you can use the following security-related paid features that are available in ESP. For more information about ESP, visit Cloud Platform Product Guide.
This set of features uses a modern, integrated approach that allows you to manage advanced network configurations and security controls for your Cloud Platform applications. Like Shield, it provides enterprise-grade networking capabilities that enable you to implement robust security measures and maintain strict compliance requirements. This solution addresses the demanding security requirements of organizations that operate in highly regulated environments.
Advanced network isolation
Secure connectivity
Access management
Private IP range with optional VPN connection
Feature | Shield | Security features in ESP |
|---|---|---|
Network Isolation | Provides network isolation for production and non-production servers based on EC2 instances in separate VPCs. | Provides network isolation for environments based on Kubernetes infrastructure, with isolated pods in subnet. |
VPN Support | Supports VPN connectivity with IKEv1 and IKEv2. | Maintains existing VPN connections and configurations. |
IP Allowlisting for SSH access | Is available for Shield subscribers on Cloud Platform Enterprise and has a limit of 25 IP addresses or CIDR ranges. | Preserves existing security configurations. |
Infrastructure | Is based on the traditional Cloud Classic infrastructure. | Is based on the modern Cloud Next infrastructure. |
Performance | Supports standard performance. | Supports enhanced performance and scalability. |
Migration Path | - | Has seamless migration path to the Cloud Next infrastructure. |
Network isolation refers to a configuration where applications operate on a dedicated pool of nodes in a Kubernetes cluster. These nodes are situated in a specific set of subnets to ensure that the applications have their own isolated environment. This setup provides an additional layer of isolation beyond the standard capabilities of Kubernetes to ensure that the application does not share memory, compute, or disk resources with applications that belong to other customers.
If your application requires stringent isolation levels, this approach offers a comparable solution while preserving the inherent benefits of the Kubernetes platform as Cloud Next is built on it.
Network isolation allows organizations to achieve a balance between enhanced security and the operational efficiencies provided by Cloud Next, which makes it an attractive option for businesses with high security and compliance needs.
If this content did not answer your questions, try searching or contacting our support team for further assistance.
If this content did not answer your questions, try searching or contacting our support team for further assistance.