YoVDO

Secure Your Microservices with ZeroTrust Approach

Offered By: Conf42 via YouTube

Tags

Cybersecurity Courses Network Security Courses Kubernetes Courses Microservices Courses Istio Courses Authorization Courses Service Mesh Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on implementing Zero Trust Architecture (ZTA) for securing microservices in Kubernetes environments. Learn about the limitations of perimeter-based security models and discover how ZTA principles can address modern cybersecurity challenges. Gain insights into practical implementation strategies, including the use of Istio service mesh, without modifying application code. Watch a detailed demonstration showcasing ZTA in action, and understand its core principles, challenges, and benefits. Acquire valuable knowledge on enhancing the security posture of your microservices architecture through this informative presentation by Jonathan Vila at Conf42 Kube Native 2023.

Syllabus

intro
some numbers
zero trust
what can you expect?
my goal for this presentation
about jonathan
about sonar
the usual context... trust on perimeter
trust on perimeter - the problem
zta and how to approach the solution
zta core principles
zta challenges
implementation
one approach to zra wuthout touching apps code
introducing istio service mesh
how does istio work?
demo
conclusions
references
thank you


Taught by

Conf42

Related Courses

Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Scalable Microservices with Kubernetes
Google via Udacity
Google Cloud Fundamentals: Core Infrastructure
Google via Coursera
Introduction to Kubernetes
Linux Foundation via edX
Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX