How to Meet Zero Trust Standards [D2iQ + GDIT]

Logo
Presented by

Moderator: Diego Laje, SIGNAL Media Speakers: Dan Ciruli, D2iQ, David Sperbeck, GDIT, and Dr. John Sahlin, GDIT

About this talk

In this session, Kubernetes experts from GDIT and D2iQ discuss how to secure your digital assets and create a Zero Trust culture within your organization. Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero-trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption, and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks. Developers and security experts are now tasked with extending Kubernetes’ built-in security to effectively protect against more complex, volatile, and frequent cyber attacks. The previous “trust but verify” approach has often proven ineffective for the complex distributed nature of cloud computing, so Kubernetes security is being elevated to the “never trust, always verify” ideology of the zero-trust model to provide greater protection to organizations. Key Takeaways: —Basic Concepts of the Zero-Trust Model —Three Best Practices for Zero Trust 1) Optimize Software Configuration, Access Permissions 2) Log and Monitor Data 3) Focus on People and Process Management —How to Create a Zero Trust Security Culture
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (16)
Subscribers (2691)
D2iQ accelerates Day 2 success for smart cloud-native applications on enterprise Kubernetes with cloud native expertise, simplicity, and military-grade security.