Cilium: The Reference Architecture for High-Performance Networking & Security
TL;DR Kubernetes networking has long been a bottleneck, hindered by outdated Linux technologies …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
Network communication is no longer “just” an infrastructure topic. It has become a central component for information security and thus for regulatory compliance.
With the NIS2 directive, which must be transposed into national law by 17.10.2024, stricter requirements for the security of critical and important facilities will become binding across Europe. DORA comes into effect on 17.01.2025 and explicitly addresses digital resilience in the financial sector. Both regulatory strands essentially demand the same: traceable, controllable, and verifiable control over data flows.
At the same time, more and more teams are working based on Kubernetes, microservices, and highly dynamic platforms. IPs, pods, and workloads are constantly changing there—classic, IP-based network security hardly scales under these conditions. What worked in static data centers quickly becomes a governance risk in a Cloud-Native environment.
Zero Trust approaches, where every connection is explicitly authorized and monitored, are thus not only a security paradigm but a tangible compliance tool. This is where Cilium with eBPF comes in: network and security are moved to where they belong in modern infrastructures—into the heart of the operating system and close to the workloads.
Cilium is a Cloud-Native networking and security platform specifically designed for containerized environments like Kubernetes. The core idea: no longer mapping network logic in iptables rule sets, sidecar proxies, or external appliances, but directly in the Linux kernel—with the help of eBPF.
eBPF (extended Berkeley Packet Filter) is a technology that allows small, specialized programs to be safely loaded into the kernel and linked to specific “events,” such as:
These programs run in a kind of “sandbox” in the kernel: a verifier checks before execution that they do not perform unsafe operations, do not loop endlessly, and only use allowed resources. As a result, the operating system can be extended very finely and precisely without having to write new kernel modules or recompile the kernel.
For networking, this means: we can implement routing, load balancing, policy enforcement, and observability directly where the packets are processed—without detours and overhead-intensive technology stacks.
In a Kubernetes environment, Cilium takes on tasks such as:
These functions are interesting for compliance because they directly address central control points: Who is allowed to talk to whom? What protocols are used? Are policies enforced? How do I prove to an auditor that the system works as specified?
A core principle of Zero Trust is microsegmentation: instead of one large, “flat” network, workloads are divided into logically separated segments, and strict rules apply between these segments.
Cilium relies on identity-based Network Policies:
For compliance, this means:
Thus, the network becomes a codified security architecture that is verifiable, reproducible, and auditable.
Regulations like NIS2, DORA, or ISO 27001 typically require the encryption of sensitive data “in transit.” Cilium supports this natively via WireGuard:
This allows even internal network segments to be secured in such a way that eavesdropping on data traffic is significantly more difficult—an important point when data centers or cloud environments are operated by external providers.
Transparency is a central pillar of Compliance: it is not just about having security measures, but also being able to prove them. Hubble, the observability subsystem of Cilium, addresses exactly that:
You can use this information to:
Based on eBPF, Cilium has access to very detailed context information about network events. This enables modern intrusion detection behavior:
For compliance-relevant standards that require Security Incident & Event Management, this is a crucial advantage: events are detected early, enriched with context, and can be transferred into standardized incident processes.
Classic packet processing in container environments often passes through multiple abstraction layers:
Each layer costs latency and CPU time.
With eBPF, central functions can be executed directly in the kernel:
In practice, this results in significantly lower latency and better scalability—an aspect that is particularly relevant with high service density and strict SLAs.
Especially in the European context, companies use a variety of Linux distributions and cloud environments. Classic kernel extensions are difficult to standardize here.
eBPF offers:
This facilitates the construction of standardized platforms across different locations and countries without having to delve deeply into the kernel for every security update.
A legitimate reflex is: “Program code in the kernel? Isn’t that dangerous?” eBPF addresses this concern by:
This creates controlled extendability that is fundamentally easier to audit than individual kernel patches or proprietary firewall appliances with opaque rule sets.
A typical use case in larger organizations is the clean separation of different tenants or domains within a cluster: departments, subsidiaries, development, and production environments. At the Kubernetes level, this separation often occurs through namespaces. Cilium can turn this into a clear, Zero Trust-compliant security perimeter.
First, a clear tenant model is created:
prod-banking, prod-insurance, test-shared).This step is organizational: it is about cleanly capturing responsibilities, data classifications, and dependencies.
TL;DR Kubernetes networking has long been a bottleneck, hindered by outdated Linux technologies …
TL;DR Secrets in Git, classic Kubernetes secrets, and manual processes are no longer sufficient for …
TL;DR Extending the classic 12-Factor-App with factors 13–15 (API First, Telemetry, Auth) is not a …