YoVDO

Identity Based Segmentation for Zero Trust Architecture

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cybersecurity Courses Network Security Courses Access Control Courses Cloud Security Courses Service Mesh Courses Identity-Aware Proxy Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of Zero Trust Architecture (ZTA) in this 38-minute conference talk presented by Zack Butcher from Tetrate and Ramaswamy Chandramouli from the National Institute of Standards and Technology (NIST). Delve into the shift from traditional perimeter security to identity-based segmentation, focusing on explicit trust and runtime authorization. Learn about identity-aware proxies and service mesh for enforcing access in cloud-to-premises communication through DMZs. Gain insights into simplifying application communication and enhancing organizational agility through the implementation of ZTA principles and policies.

Syllabus

Identity Based Segmentation for a ZTA - Zack Butcher, Tetrate & Ramaswamy Chandramouli, NIST


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Computing, Storage and Security with Google Cloud Platform
Google via Coursera