Identity Based Segmentation for Zero Trust Architecture
CNCF [Cloud Native Computing Foundation] via YouTube
AI Engineer - Learn how to integrate AI into software applications
MIT Sloan: Lead AI Adoption Across Your Organization — Not Just Pilot It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the concept of Zero Trust Architecture (ZTA) in this 38-minute conference talk presented by Zack Butcher from Tetrate and Ramaswamy Chandramouli from the National Institute of Standards and Technology (NIST). Delve into the shift from traditional perimeter security to identity-based segmentation, focusing on explicit trust and runtime authorization. Learn about identity-aware proxies and service mesh for enforcing access in cloud-to-premises communication through DMZs. Gain insights into simplifying application communication and enhancing organizational agility through the implementation of ZTA principles and policies.
Syllabus
Identity Based Segmentation for a ZTA - Zack Butcher, Tetrate & Ramaswamy Chandramouli, NIST
Taught by
CNCF [Cloud Native Computing Foundation]