YoVDO

Identity-Based Segmentation: An Emerging Standard for Zero Trust from NIST

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Access Control Courses Cloud Security Courses Cloud-Native Applications Courses Service Mesh Courses Identity-Aware Proxy Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the emerging standard of identity-based segmentation for Zero Trust architecture in this 36-minute conference talk by Zack Butcher from Tetrate. Delve into the shift from perimeter security to explicit trust based on identity and runtime authorization. Learn about authenticating and authorizing workloads, identity-aware proxies, and service mesh for enforcing access. Gain insights into the forthcoming NIST Special Publication 800-207A, which outlines a Zero Trust Architecture (ZTA) model for access control in cloud-native applications across multi-location environments. Discover a concise definition of "zero trust architecture" and examine how identity-aware proxies and policy can simplify application communication from cloud to on-premises through a DMZ, enhancing security without compromising organizational agility.

Syllabus

Identity-Based Segmentation: An Emerging Standard for Zero Trust from NIST - Zack Butcher, Tetrate


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Regulating Resource Usage Using Google Cloud IAM
Pluralsight
Networking in Google Cloud
Google via Qwiklabs
Build and Secure Networks in Google Cloud
Google via Qwiklabs
Ensure Access & Identity in Google Cloud
Google via Qwiklabs
Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust
Google Cloud via Coursera