Главная
Study mode:
on
1
Introduction
2
Meet Doug and Evan
3
Problem Statement
4
Example Policy
5
VPN Architecture
6
Scalability Concerns
7
Raw IP
8
Network properties
9
Google Beyond Core
10
Zero Trust
11
Every Flow is Expected
12
Symbolic Policy
13
Network Agent
14
Automation
15
Visibility
16
Whitelisting
17
Key Systems
18
Inventory Systems
19
Configuration Management Systems
20
Authentication Services
21
Zero Trust Network Implementations
22
Data Plane
23
Server vs Client
24
Provisioning Service
25
Removing Trust
26
Agility
27
Client side
28
Large corporate network
29
Beyond Corp
30
Control Plan
31
SSO
32
Access Control Engine
33
Zero Trust Corporate Network
34
Trust Inference Engine
35
Behavioral Harristix
36
User Experience
37
Reality
38
Building Blocks
39
Clientside implementations
40
Serverside implementations
41
Commercial options
42
Conclusion
43
Endpoint Management
44
BlueScient
Description:
Explore the concept of Zero Trust Networks in this comprehensive conference talk from BSidesLV 2017. Delve into both theoretical and practical aspects of this security model as presented by Doug Barth and Evan Gilman. Learn about the problem statement, example policies, and VPN architecture before addressing scalability concerns. Examine network properties, Google's Beyond Corp initiative, and the core principles of Zero Trust, including expected flows and symbolic policies. Discover key systems such as inventory and configuration management, as well as authentication services. Investigate various Zero Trust Network implementations, including data plane considerations, provisioning services, and the removal of trust. Gain insights into client-side and server-side implementations, large corporate networks, and control plane elements like SSO and access control engines. Explore the user experience, reality of implementation, and available building blocks, including commercial options. Conclude with a discussion on endpoint management and BlueScienti, providing a thorough understanding of Zero Trust Networks in both theory and practice. Read more

Zero Trust Networks - In Theory and in Practice

BSidesLV
Add to list