• Reclunautas

12-Ago-21 Automate to Approach Zero Trust Security w/ Rosemary Wang

We've heard the buzzword of "zero trust" - trust nothing, verify everything - but how close can we really get? I'll dive into how you can automate your infrastructure and applications to approach zero trust security. I'll survey some of the important tools and ecosystems to consider and demonstrate how to consolidate some of the automation with infrastructure as code, service mesh, secrets management, and secure access management tools. By the end of this session, you'll be able to identify ways to approach zero trust in your infrastructure and applications. Note: This session uses technologies like Kubernetes, AWS, Terraform, Consul, Vault, and Boundary but they are not required as prerequisites! ---------------------------------------------------------------------------------------------------- Speaker Bio: Rosemary Wang works to bridge the technical and cultural barriers between infrastructure, security, and application development. She has a fascination for solving intractable problems as a contributor, public speaker, writer, and advocate of open source infrastructure tools. Recently, Rosemary has been writing her upcoming book, Essential Infrastructure as Code. When she is not drawing on whiteboards, Rosemary valiantly attempts to hack stacks of various infrastructure systems on her laptop while watering her houseplants.


2 visualizaciones0 comentarios