What Can Go Wrong When You Trust Nobody? Threat Modeling Zero Trust
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore the critical intersection of Zero Trust principles and cloud-native technologies in this 32-minute conference talk from the Cloud Native Computing Foundation (CNCF). Delve into the importance of threat modeling in multi-cloud and hybrid architectures, learning how to apply the 'never trust, always verify' philosophy effectively. Discover fundamental threat modeling concepts and their application to distributed cloud-native workloads. Examine a demonstration of a simple system built on Zero Trust principles, featuring Istio service mesh within a Kubernetes cluster. Learn about implementing cryptographically strong workload identities using SPIRE server and leveraging Istio External Authorization for delegating layer 7 authorization decisions to OPA sidecars. Gain insights into building a comprehensive threat model and introducing controls aligned with Zero Trust philosophy, including a demonstration of custom signing and verification of OPA bundles.
Syllabus
What Can Go Wrong When You Trust Nobody? Threat Modeling Zero Trust - J Callaghan & R Featherstone
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Hands-on Introduction to GitGat for SCM SecurityRawkode Academy via YouTube Introduction to Open Policy Agent - Rego Language and Kubernetes Policies
Rawkode Academy via YouTube Overcoming CVE Shock - Adding Perspective in Vulnerability Scanning
Devoxx via YouTube How to Secure a Kubernetes Cluster from Scratch
Devoxx via YouTube Tools to Help You Secure Your Kubernetes Cluster
Devoxx via YouTube