Establishing a Production Zero Trust Architecture
CNCF [Cloud Native Computing Foundation] via YouTube
Overview
Syllabus
Intro
Reality/Assumption Gap
Drivers
Change comes with Risk
Triangle of Trust
Perimeter Defense - Zero Trust
Zero Trust Environment
User Identity
Attest Workloads
Establish Policy
Establish Trust between Organizations
Application needs a connection to the Secure Corporate Intranet!
Advanced Use Case: Multi-Party Edge Compute
Identities for Infrastructure too
No Workload Authentication
Multi-factor Authorization (SPIFFE+JWT)
Workload 2FA: Identity Provider + Application Identity
Let's back up and talk strategy
Information Security 101
One possible early strategy
Observability
Education
An Aside: Legacy Systems
Automate
Educate
Taught by
CNCF [Cloud Native Computing Foundation]