LISA: A Practical Zero Trust Architecture

LISA: A Practical Zero Trust Architecture

USENIX Enigma Conference via YouTube Direct link

Configure Infrastructure

10 of 14

10 of 14

Configure Infrastructure

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

LISA: A Practical Zero Trust Architecture

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Your office network is a liability.
  2. 2 LISA Principles
  3. 3 Trust identity and health, not location.
  4. 4 Treat your network like a coffee shop.
  5. 5 Architecture
  6. 6 Endpoint Checks
  7. 7 Implementation Collect, Create, Configure
  8. 8 Collect Use Cases
  9. 9 Create Exception Networks
  10. 10 Configure Infrastructure
  11. 11 Automated Deprovisioning Match port to email address
  12. 12 Benefits
  13. 13 Lessons Learned
  14. 14 Next Steps

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.