The cluster hums, but traffic is a threat until you control it. Kubernetes Network Policies give you that control. They define how pods communicate with each other and with the outside world. Without a policy, any pod can talk to any other. With a policy, you decide exactly who talks to who, on what ports, and using which protocols.
Network Policies in Kubernetes are implemented by the CNI plugin. Popular CNIs like Calico, Cilium, and Weave Net interpret policy rules and enforce them in the data plane. Kubernetes itself only provides the API and the model. The enforcement is the responsibility of the networking layer.
From a licensing perspective, it's important to separate the abstract specification from the concrete implementation. The Kubernetes API is open source under the Apache 2.0 license. This means the Network Policy resource definitions are free to use, modify, and distribute without licensing fees. However, the actual CNI that enforces policies may use a different licensing model. Calico is Apache 2.0 with enterprise features under proprietary terms. Cilium is also Apache 2.0, with premium support and enterprise add-ons. Other CNIs may follow GPL or commercial models.