Artwork

محتوای ارائه شده توسط TruStory FM. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط TruStory FM یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

Demystifying Zero Trust: Key Policy Checks for Cloud Native Security with Zack Butcher

32:32
 
اشتراک گذاری
 

Manage episode 439333635 series 3533050
محتوای ارائه شده توسط TruStory FM. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط TruStory FM یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Decoding Zero Trust Security for Cloud Native Environments

In this episode of Cyber Sentries, John Richards welcomes Zack Butcher, Founding Engineer at Tetrate, to explore the critical components of zero trust security for cloud native and microservice environments. Zack, with deep expertise from his time at Google and work with NIST, shares practical insights on achieving a zero trust posture.

John and Zack dive into the fundamental mindset shift required for zero trust - moving from implicit to explicit trust. They break down the five key policy checks that define runtime zero trust, and how these controls can enable identity-based segmentation. Zack illuminates how this approach allows organizations to boost assurance while strategically relaxing painful network-level constraints.

Questions we answer in this episode:
• What does Zero Trust really mean in practice?
• How can organizations adopt a Zero Trust mindset?
• What role does a service mesh play in Zero Trust?

Key Takeaways:
• Zero Trust requires making all trust explicit
• 5 key runtime policy checks define a Zero Trust posture
• Identity-based policies boost assurance and agility

Whether you're wrestling with Zero Trust definitions, microservice security, or cloud native challenges, this episode delivers a wealth of battle-tested wisdom. Zack's clear explanations and examples, combined with John's knack for extracting practical takeaways, make this a must-listen for anyone navigating the complex world of cloud native security.

Links & Notes

  • (00:04) - Welcome to Cyber Sentries
  • (01:01) - Meet Zack
  • (04:55) - Reflecting on the Journey
  • (05:46) - Deep on Security Aspect
  • (09:52) - Zero Trust and Definitions
  • (15:35) - Consensus
  • (18:09) - Availability and Assurance
  • (22:28) - Driving Growth
  • (25:44) - How AI Can Be Used for Security
  • (30:07) - Links and Finding Zack
  • (30:36) - Wrap Up
  continue reading

13 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 439333635 series 3533050
محتوای ارائه شده توسط TruStory FM. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط TruStory FM یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Decoding Zero Trust Security for Cloud Native Environments

In this episode of Cyber Sentries, John Richards welcomes Zack Butcher, Founding Engineer at Tetrate, to explore the critical components of zero trust security for cloud native and microservice environments. Zack, with deep expertise from his time at Google and work with NIST, shares practical insights on achieving a zero trust posture.

John and Zack dive into the fundamental mindset shift required for zero trust - moving from implicit to explicit trust. They break down the five key policy checks that define runtime zero trust, and how these controls can enable identity-based segmentation. Zack illuminates how this approach allows organizations to boost assurance while strategically relaxing painful network-level constraints.

Questions we answer in this episode:
• What does Zero Trust really mean in practice?
• How can organizations adopt a Zero Trust mindset?
• What role does a service mesh play in Zero Trust?

Key Takeaways:
• Zero Trust requires making all trust explicit
• 5 key runtime policy checks define a Zero Trust posture
• Identity-based policies boost assurance and agility

Whether you're wrestling with Zero Trust definitions, microservice security, or cloud native challenges, this episode delivers a wealth of battle-tested wisdom. Zack's clear explanations and examples, combined with John's knack for extracting practical takeaways, make this a must-listen for anyone navigating the complex world of cloud native security.

Links & Notes

  • (00:04) - Welcome to Cyber Sentries
  • (01:01) - Meet Zack
  • (04:55) - Reflecting on the Journey
  • (05:46) - Deep on Security Aspect
  • (09:52) - Zero Trust and Definitions
  • (15:35) - Consensus
  • (18:09) - Availability and Assurance
  • (22:28) - Driving Growth
  • (25:44) - How AI Can Be Used for Security
  • (30:07) - Links and Finding Zack
  • (30:36) - Wrap Up
  continue reading

13 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع