Главная
Study mode:
on
1
Intro
2
Agenda
3
What is perimeter security
4
SPiffy
5
SPiffy vs Traditional PKI
6
Spire
7
Plugins
8
Design Considerations
9
Practical Uses
10
Envoy Proxy
11
Spiffy Helper
12
High Availability
13
Separate Trust Domains
14
Continuous Integration Continuous Delivery
15
Spiffy ID
16
OIDC Federation
17
Nested Spire
18
Spiffy Federation
19
Spire Roadmap
20
Spire 10 Features
21
Whos usingSpire
22
Next Steps
23
Website
24
Thank You
Description:
Explore the concept of Zero Trust security in cloud native infrastructure through this informative conference talk. Learn how to overcome security barriers in microservices, Kubernetes, and cloud computing by implementing a Zero Trust architecture. Discover how to build a solid foundation using SPIFFE and SPIRE, and enhance security with tools like OPA and Envoy. Examine sample architectures from Fortune 500 organizations and gain insights into their implementation processes. Delve into topics such as perimeter security, SPIFFE vs. traditional PKI, Spire plugins, design considerations, and practical uses. Explore advanced concepts including Envoy Proxy integration, high availability, separate trust domains, CI/CD, OIDC federation, and nested Spire deployment. Get a glimpse of the Spire roadmap, upcoming features, and learn about organizations currently using Spire. Gain valuable knowledge to enhance the security of your cloud native infrastructure and protect against specific attacks.

No More Moats - Protecting Your Cloud Native Infrastructure with Zero Trust

CNCF [Cloud Native Computing Foundation]
Add to list