Part 3: Adopting Zero Trust for Secure Digital Experiences
Zero trust is driven by a simple philosophy: Never implicitly trust; always verify; and continuously monitor. And zero trust-based security is achieved by applying zero trust principles across the entire security stack, application delivery stack, and the application development lifecycle.
We’ll cover how to achieve zero trust with security solutions that offer continuous monitoring of payload in transaction between users and workloads, and those that occur among workloads with WAF in appropriate form factor, as well as machine-learning based identification of anomalies and automated calculation of risk for HTTP/S transactions.
In this webinar, you’ll learn:
- Zero Trust reference architecture, based on NIST 800-207
- Maturity model for zero trust based on CISA
- How F5 can help, through authentication and transaction-aware access control, and more