Identity-Based Segmentation: An Emerging Standard for Zero Trust from NIST
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Explore the emerging standard of identity-based segmentation for Zero Trust architecture in this 36-minute conference talk by Zack Butcher from Tetrate. Delve into the shift from perimeter security to explicit trust based on identity and runtime authorization. Learn about authenticating and authorizing workloads, identity-aware proxies, and service mesh for enforcing access. Gain insights into the forthcoming NIST Special Publication 800-207A, which outlines a Zero Trust Architecture (ZTA) model for access control in cloud-native applications across multi-location environments. Discover a concise definition of "zero trust architecture" and examine how identity-aware proxies and policy can simplify application communication from cloud to on-premises through a DMZ, enhancing security without compromising organizational agility.
Syllabus
Identity-Based Segmentation: An Emerging Standard for Zero Trust from NIST - Zack Butcher, Tetrate
Taught by
CNCF [Cloud Native Computing Foundation]