Establishing a Production Zero Trust Architecture

Establishing a Production Zero Trust Architecture

CNCF [Cloud Native Computing Foundation] via YouTube Direct link

Perimeter Defense - Zero Trust

6 of 25

6 of 25

Perimeter Defense - Zero Trust

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Establishing a Production Zero Trust Architecture

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Reality/Assumption Gap
  3. 3 Drivers
  4. 4 Change comes with Risk
  5. 5 Triangle of Trust
  6. 6 Perimeter Defense - Zero Trust
  7. 7 Zero Trust Environment
  8. 8 User Identity
  9. 9 Attest Workloads
  10. 10 Establish Policy
  11. 11 Establish Trust between Organizations
  12. 12 Application needs a connection to the Secure Corporate Intranet!
  13. 13 Advanced Use Case: Multi-Party Edge Compute
  14. 14 Identities for Infrastructure too
  15. 15 No Workload Authentication
  16. 16 Multi-factor Authorization (SPIFFE+JWT)
  17. 17 Workload 2FA: Identity Provider + Application Identity
  18. 18 Let's back up and talk strategy
  19. 19 Information Security 101
  20. 20 One possible early strategy
  21. 21 Observability
  22. 22 Education
  23. 23 An Aside: Legacy Systems
  24. 24 Automate
  25. 25 Educate

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.