התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


1 The Southwest’s Wildest Outdoor Art: From Lightning Fields to Sun Tunnels 30:55
AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices
Manage episode 380271552 series 3462572
Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it relates to microservices.
Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.
There are several guiding concepts that make it easier for organizations to build a Zero Trust strategy. The first that typically come to mind come from CISA and NIST. These core elements, ranging from the five pillars through to building a ZT architecture, offer a vendor-neutral path towards removing implicit trust. Organizations like CSA also do a great job of expanding upon this knowledge with more contributions from technology and service providers. This week, we take our first step towards understanding what goes on behind these policies, standards, and recommendations, and for that we have a well-equipped guest to walk us through it.
Zack Butcher is one of the founding engineers over at Tetrate, a vendor that provides a consistent way to connect and protect thousands of individual microservices and deliver Zero Trust security operations across any environment. They also have their roots stemming from a team that worked at Google, which many of you are likely familiar with their connection to Zero Trust through BeyondCorp. However, he is also the co-author on NIST special publication 800-207A. If that looks familiar, it’s because it’s an expansion of the earlier mentioned core NIST resource, 800-207.
NIST SP 800-207A builds upon that core architecture piece and hones in on access controls in cloud-native applications in multi-cloud environments. That is a bit of a mouthful, so here is Zack on what you need to know.
When we talk about Zero Trust at runtime, there's a lot of FUD and a frustrating amount of FUD in the in the marketplace and a lot of vendors claiming certain things are Zero Trust and not.
And you know, in that landscape, I wanted to really kind of push for people to have a very clear definition of Zero Trust at runtime, and it's a minimum definition. Let me be clear. You can do a whole lot more than what we talk about in the SP, but I try and give a very, very simple minimum definition. And that is five policy checks at runtime, and we call that identity based segmentation.
Butcher also co-authored NIST SP 800-204A that focuses on building secure microservices-based applications using service-mesh architecture. So this week, Neal and Butcher ran down the rabbit hole of expanding upon these core Zero Trust resources, implications of a more secure environment at runtime, and identity-based segmentation.
56 פרקים
Manage episode 380271552 series 3462572
Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it relates to microservices.
Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.
There are several guiding concepts that make it easier for organizations to build a Zero Trust strategy. The first that typically come to mind come from CISA and NIST. These core elements, ranging from the five pillars through to building a ZT architecture, offer a vendor-neutral path towards removing implicit trust. Organizations like CSA also do a great job of expanding upon this knowledge with more contributions from technology and service providers. This week, we take our first step towards understanding what goes on behind these policies, standards, and recommendations, and for that we have a well-equipped guest to walk us through it.
Zack Butcher is one of the founding engineers over at Tetrate, a vendor that provides a consistent way to connect and protect thousands of individual microservices and deliver Zero Trust security operations across any environment. They also have their roots stemming from a team that worked at Google, which many of you are likely familiar with their connection to Zero Trust through BeyondCorp. However, he is also the co-author on NIST special publication 800-207A. If that looks familiar, it’s because it’s an expansion of the earlier mentioned core NIST resource, 800-207.
NIST SP 800-207A builds upon that core architecture piece and hones in on access controls in cloud-native applications in multi-cloud environments. That is a bit of a mouthful, so here is Zack on what you need to know.
When we talk about Zero Trust at runtime, there's a lot of FUD and a frustrating amount of FUD in the in the marketplace and a lot of vendors claiming certain things are Zero Trust and not.
And you know, in that landscape, I wanted to really kind of push for people to have a very clear definition of Zero Trust at runtime, and it's a minimum definition. Let me be clear. You can do a whole lot more than what we talk about in the SP, but I try and give a very, very simple minimum definition. And that is five policy checks at runtime, and we call that identity based segmentation.
Butcher also co-authored NIST SP 800-204A that focuses on building secure microservices-based applications using service-mesh architecture. So this week, Neal and Butcher ran down the rabbit hole of expanding upon these core Zero Trust resources, implications of a more secure environment at runtime, and identity-based segmentation.
56 פרקים
كل الحلقات
×
1 How Critical Infrastructure Leaders Are Rethinking Cybersecurity 44:32

1 Shadows Within Shadows: How AI is Challenging IT Teams 48:12

1 Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust 32:50

1 Predicting the year of cybersecurity ahead (minus regulations) 1:02:52

1 Kicking Off Season 4 of Adoption Zero Trust (AZT) 22:43

1 The key to growing a cybersecurity career are soft skills 50:38

1 Behind the scenes of cybersecurity media and reporting 1:04:53

1 GRC tool or spreadsheets, that is the question | GRC Uncensored Preview 43:13

1 Podcast Preview: GRC Uncensored and the commoditization of compliance 41:30

1 How to prepare your operations team for Zero Trust 46:17

1 Log4j Continues to act as Organizational Vulnerability 47:56

1 Overturning of Chevron Deference’s Impact on Cybersecurity Regulation 51:44

1 Applying Vulnerability Management to Zero Trust 45:43

1 The Unstoppable Phish: A Discussion with Vivek Ramachandran 26:31

1 Adopting Zero Trust: Philosophy of Prevention with iHeartMedia’s Janet Heins 44:02

1 Adopting Zero Trust: Continuous Trust 29:49

1 Adopting Zero Trust: Nonfederated Apps 54:44

1 Adopting Zero Trust: SIM Swapped 59:44

1 Adopting Zero Trust with Bloomberg: Implemented 51:49

1 Adopting Zero Trust with Bitwarden: The Mighty Password 54:32

1 Adopting Zero Trust: Empathetic Leadership with Kyndryl’s Kris Lovejoy 57:45

1 Adopting Zero Trust: Cybersecurity Innovation with Stanford Fellow AJ Grotto 39:14

1 AZT: The National Cybersecurity Strategy 55:36

1 Adopting Zero Trust: Open Source 58:46

1 Adopting Zero Trust with Author George Finney: Approachable 50:43

1 Adopting Zero Trust: Zero Knowledge Authority 48:50

1 Adopting Zero Trust With Ismael Valenzuela: Less Trust 48:47

1 Adopting Zero Trust: Season One is Wrapped 49:52

1 Adopting Zero Trust with Chase Cunningham: The Doctor is in 56:17
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.