AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it relates to microservices.

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.

There are several guiding concepts that make it easier for organizations to build a Zero Trust strategy. The first that typically come to mind come from CISA and NIST. These core elements, ranging from the five pillars through to building a ZT architecture, offer a vendor-neutral path towards removing implicit trust. Organizations like CSA also do a great job of expanding upon this knowledge with more contributions from technology and service providers. This week, we take our first step towards understanding what goes on behind these policies, standards, and recommendations, and for that we have a well-equipped guest to walk us through it.

Zack Butcher is one of the founding engineers over at Tetrate, a vendor that provides a consistent way to connect and protect thousands of individual microservices and deliver Zero Trust security operations across any environment. They also have their roots stemming from a team that worked at Google, which many of you are likely familiar with their connection to Zero Trust through BeyondCorp. However, he is also the co-author on NIST special publication 800-207A. If that looks familiar, it’s because it’s an expansion of the earlier mentioned core NIST resource, 800-207.

NIST SP 800-207A builds upon that core architecture piece and hones in on access controls in cloud-native applications in multi-cloud environments. That is a bit of a mouthful, so here is Zack on what you need to know.

When we talk about Zero Trust at runtime, there's a lot of FUD and a frustrating amount of FUD in the in the marketplace and a lot of vendors claiming certain things are Zero Trust and not.

And you know, in that landscape, I wanted to really kind of push for people to have a very clear definition of Zero Trust at runtime, and it's a minimum definition. Let me be clear. You can do a whole lot more than what we talk about in the SP, but I try and give a very, very simple minimum definition. And that is five policy checks at runtime, and we call that identity based segmentation.

Butcher also co-authored NIST SP 800-204A that focuses on building secure microservices-based applications using service-mesh architecture. So this week, Neal and Butcher ran down the rabbit hole of expanding upon these core Zero Trust resources, implications of a more secure environment at runtime, and identity-based segmentation.

Hosted on Acast. See acast.com/privacy for more information.

Episoder(58)

The Security Debt We Pretend Isn’t There

The Security Debt We Pretend Isn’t There

As organizations push return-to-office (RTO) mandates and chase efficiency, many security teams are quietly accumulating debt they don’t know how to unwind.In this episode, we are joined by Lea Cure T...

29 Jan 50min

Whisper Leak: How Encrypted AI Chats Still Leak Conversation Topics

Whisper Leak: How Encrypted AI Chats Still Leak Conversation Topics

In this episode, we break down Whisper Leak, a newly disclosed side-channel issue affecting encrypted LLM communications. JBO explains how attackers can infer conversation topics using packet size and...

11 Des 202531min

How Critical Infrastructure Leaders Are Rethinking Cybersecurity

How Critical Infrastructure Leaders Are Rethinking Cybersecurity

In this episode of Adopting Zero Trust, hosts Elliot Volkman and Neal Dennis discuss critical infrastructure security with expert guest Ian Branson, Vice President of Global Industrial Cybersecurity a...

17 Apr 202544min

Shadows Within Shadows: How AI is Challenging IT Teams

Shadows Within Shadows: How AI is Challenging IT Teams

In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Island, to discuss how AI is compounding the already e...

20 Mar 202548min

Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust

Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust

Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here.Live from ThreatLocker’s Zero Trust World (ZTW), cybersecurity heavyweights Dave Bittner, host of CyberWire D...

6 Mar 202532min

Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals

Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals

New intelligence: Silk Typhoon, formerly tracked as HAFNIUM, is a China-based threat actor most recently observed targeting IT supply chains in the US. Today, we released a new report in conjunction w...

5 Mar 20253min

Predicting the year of cybersecurity ahead (minus regulations)

Predicting the year of cybersecurity ahead (minus regulations)

It’s mid-February, but somehow, we’ve already been through what feels like a year's worth of change in the cybersecurity and regulation world. Beyond the standard incidents, outages, and attacks… ther...

18 Feb 20251h 2min

Kicking Off Season 4 of Adoption Zero Trust (AZT)

Kicking Off Season 4 of Adoption Zero Trust (AZT)

Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here.Neal and I are excited to welcome you back to AZT as we kick off our fourth season. After four years of tryin...

11 Feb 202522min

Populært innen Teknologi

romkapsel
tomprat-med-gunnar-tjomlid
rss-avskiltet
teknisk-sett
nasjonal-sikkerhetsmyndighet-nsm
energi-og-klima
shifter
lydartikler-fra-aftenposten
elektropodden
rss-impressions-2
fornybaren
hans-petter-og-co
rss-alt-vi-kan
rss-ki-praten
pedagogisk-intelligens
smart-forklart
rss-fish-ships
rss-trippel-bunnlinje
rss-alt-som-gar-pa-strom
rss-ai-forklart