Главная
Study mode:
on
1
Your office network is a liability.
2
LISA Principles
3
Trust identity and health, not location.
4
Treat your network like a coffee shop.
5
Architecture
6
Endpoint Checks
7
Implementation Collect, Create, Configure
8
Collect Use Cases
9
Create Exception Networks
10
Configure Infrastructure
11
Automated Deprovisioning Match port to email address
12
Benefits
13
Lessons Learned
14
Next Steps
Description:
Explore a practical Zero Trust architecture in this 19-minute conference talk from USENIX Enigma 2018. Discover how Netflix pioneered the Location Independent Security Approach (LISA), which removes trust from office networks and replaces it with trust in authenticated users and healthy devices. Learn about LISA principles, architecture, implementation steps, and benefits. Gain insights into treating your network like a coffee shop, automated deprovisioning, and lessons learned. Evaluate how to implement similar programs in your organization to enhance security beyond traditional perimeter-based approaches.

LISA: A Practical Zero Trust Architecture

USENIX Enigma Conference
Add to list
0:00 / 0:00