YoVDO

LISA: A Practical Zero Trust Architecture

Offered By: USENIX Enigma Conference via YouTube

Tags

Network Security Courses Identity Management Courses Endpoint Security Courses

Course Description

Overview

Explore a practical Zero Trust architecture in this 19-minute conference talk from USENIX Enigma 2018. Discover how Netflix pioneered the Location Independent Security Approach (LISA), which removes trust from office networks and replaces it with trust in authenticated users and healthy devices. Learn about LISA principles, architecture, implementation steps, and benefits. Gain insights into treating your network like a coffee shop, automated deprovisioning, and lessons learned. Evaluate how to implement similar programs in your organization to enhance security beyond traditional perimeter-based approaches.

Syllabus

Your office network is a liability.
LISA Principles
Trust identity and health, not location.
Treat your network like a coffee shop.
Architecture
Endpoint Checks
Implementation Collect, Create, Configure
Collect Use Cases
Create Exception Networks
Configure Infrastructure
Automated Deprovisioning Match port to email address
Benefits
Lessons Learned
Next Steps


Taught by

USENIX Enigma Conference

Related Courses

Office 365: Managing Identities and Services
Microsoft via edX
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Windows 10 pour l'entreprise
Microsoft Virtual Academy via OpenClassrooms
Introduction to Microsoft Azure
Microsoft via edX
Manage Office 365 Identities
Microsoft via edX