Microsoft Azure and AKS

Tigera and Microsoft Azure together deliver active build, deploy and runtime security with full-stack observability for securing, monitoring, and troubleshooting Linux and Windows containers on Azure and AKS


Calico helps Microsoft Azure and AKS users protect their heterogeneous workload environments and Kubernetes, detect threats and achieve continuous compliance. Users can apply a standard set of zero-trust workload access controls, enforce consistent security policies and have real-time visualization of services, namespaces, and pod communication for faster troubleshooting. Users can deploy and manage a consistent set of security policies across both Windows and Linux servers hosting Kubernetes clusters on the Microsoft Azure cloud and AKS.



Protect your container and Kubernetes workloads running on Microsoft Azure Kubernetes Service (AKS) and applications with pod-level access controls


Create and enforce compliance policies in AKS and Microsoft Azure as per regulatory and organizational requirements


Identify and resolve connectivity issues and security policy violations between namespaces, microservices, and pods in AKS and Microsoft Azure

Top Use Cases

Workload Access Controls

Security teams need to control the flow of data between Kubernetes clusters and external resources, in order to mitigate the risk of unauthorized access to applications and data, exposure of sensitive data such as personally identifiable information (PII), and introduction of malware and ransomware.

Implement pod-level workload access controls and protect containerized environments in Microsoft Azure and AKS from outside threats, while enabling applications and workloads to securely communicate with resources outside the cluster behind a firewall or other control point.

Regulatory and Compliance

Businesses, subject to corporate and/or regulatory compliance requirements, need to isolate workloads containing sensitive data or restrict access to specific resources. Auditors need proof of control enforcement, but capturing the information required to show proof is challenging, especially in a dynamic, distributed microservices environment where containers are short lived.

Create compliance policies for any compliance framework including PCI, SOC 2, and more. Continuously monitor compliance for your container, Kubernetes, and cloud environment. Retain a daily history of your compliance status. Generate on-demand or scheduled audit reports.

Faster Troubleshooting

Kubernetes workloads are highly dynamic, ephemeral, and are deployed on a distributed and agile infrastructure. As a result, fast troubleshooting of Kubernetes workloads is challenging. Teams require better visibility, and contextual information for microservices, their dependencies, how they are interconnected, and which other clients and applications access them.

Enable faster troubleshooting of Kubernetes workloads and applications with Dynamic Service Graph, Dynamic Packet Capture, anomaly detection, and performance hotspots, leading to shorter time-to-resolution, less application downtime, and improved quality of service.

Quick Start

Developers and administrators who want to apply security-policy enforcement to Microsoft Azure or AKS clusters can get started with Calico Cloud in just a few minutes. Calico Cloud provides a rich networking and security policy model for Windows and Linux containers and Kubernetes that helps secure communications by controlling traffic flows.

How It Works

Calico provides a common networking and security policy model, using Kubernetes constructs like labels and selectors to control and restrict access to specific namespaces, microservices, and pods in both Linux and Windows environments.

Key Capabilities

Get Started

Getting started with Calico and Microsoft AKS is easy.
Everything you need to get Calico installed and configured in your Microsoft Azure AKS cluster is available here:

User Guide

Learn More


Azure Marketplace

Learn More


Learn More


Learn More

Become a Tigera Partner