Cilium: eBPF-based Networking for Zero Trust and Compliance
TL;DR Cilium leverages eBPF to execute network functions directly in the Linux kernel, enabling …

In a world where cloud-native architectures, remote development, and complex multi-cluster infrastructures have become the norm, traditional VPN-based access is simply outdated. Zero Trust Network Access (ZTNA) is not just a trend but a necessity: a modern paradigm where trust is never blind and every access is explicitly verified—regardless of location, device, or network.
In this article, we explain:
ZTNA is based on the core principle of “Never trust, always verify.” Unlike VPNs that trust traditional network zones, ZTNA individually verifies each connection—even within the internal network. Authentication (often OIDC-based), device status, context, and identity determine whether access is granted—and only to the permissible target resources, following the Least Privilege principle. This is often combined with terms like “Software-Defined Perimeter (SDP)” or “Secure Access Service Edge (SASE).” Here are some key advantages:
Well-known VPN technologies, on the other hand:
Modern software development imposes the following requirements on network security:
At the same time, developers do not want to be slowed down by security. A traditional firewall with a VPN conglomerate slows innovation, while ZTNA enables secure, auditable, yet seamless access.
Current studies show: 83% of engineers bypass security mechanisms just to remain productive—because legacy access paths like static firewall rules and VPNs no longer scale (Source).
ZTNA is thus the future of cloud-native delivery—because it ensures security without friction, granular access, and compliance access.
There is a growing number of established ZTNA providers. Here are some examples:
Common features of proprietary offerings:
But also: vendor lock-in, licensing costs, no local control, rarely in-house hostable.
While many ZTNA solutions are proprietary, costly, and heavily vendor-driven, NetBird takes a fundamentally different approach: open source, built on WireGuard, with support for all major operating systems and platforms. It combines a lean architecture with modern standards like OIDC for identity and access control.
Core features of NetBird:
This positions NetBird between traditional enterprise products and modern open-source communities—as an accessible, auditable, and cost-effective solution.
Proprietary solutions like Cisco Secure or Fortinet offer powerful management suites but are often cumbersome and opaque. NetBird, on the other hand, is open, source code available, and lightweight. Companies see how their data flows run and can audit the code.
License-based providers work with user or gateway licenses, which can quickly become expensive as the organization grows. NetBird as an OSS solution can be self-hosted or used in managed variants—economically much more flexible.
While large providers often rely on their own ecosystems (e.g., Cisco, Zscaler), NetBird integrates seamlessly into existing toolchains. Especially in cloud-native environments, where Kubernetes, GitOps, and OIDC dominate, this openness is a decisive advantage.
Proprietary cloud services raise questions of data sovereignty—where do logs run, where are the policy engines? With NetBird, companies can operate everything in their own infrastructure, GDPR and ISO27001 compliant.
Another plus: NetBird is lightweight and developer-centric. Developers don’t have to manage a complex VPN setup but can access the required resources directly via OIDC login and client app.
Choosing an open-source solution like NetBird is more than a cost issue—it’s a strategic decision for control, transparency, and future-proofing.
These features are particularly essential for critical infrastructures, regulated industries, and companies with compliance requirements. NetBird is an enabler of digital sovereignty.
ZTNA is not just a security feature but an enabler for modern delivery models. In a Kubernetes-based environment, this means:
With ZTNA, the software supply chain is secured from start to finish—from the commit in GitLab to runtime in the Kubernetes cluster.
At ayedo, we use NetBird as a central ZTNA solution in our developer platforms. Typical scenarios include:
This enables us to provide developers with seamless, secure, and controlled access to exactly the resources they need—no more, no less.
ZTNA is no longer an option but a necessity for companies that want to operate cloud-native infrastructures securely and efficiently. Proprietary solutions offer stability but bring dependencies, costs, and opacity.
NetBird shows that there is another way: fast, flexible, open, OIDC-integrated, and auditable.
Especially in a time when developer freedom, regulatory requirements, and supply chain security must be considered together, an open-source solution like NetBird is a crucial building block. Combined with ayedo Developer Platforms, it becomes a secure, scalable foundation for modern software delivery.
TL;DR Cilium leverages eBPF to execute network functions directly in the Linux kernel, enabling …
Weekly Backlog #47 — Digital Sovereignty? I have a few questions… Editorial Welcome to a week where …
TL;DR Secrets in Git, classic Kubernetes secrets, and manual processes are no longer sufficient for …