AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it relates to microservices.

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.

There are several guiding concepts that make it easier for organizations to build a Zero Trust strategy. The first that typically come to mind come from CISA and NIST. These core elements, ranging from the five pillars through to building a ZT architecture, offer a vendor-neutral path towards removing implicit trust. Organizations like CSA also do a great job of expanding upon this knowledge with more contributions from technology and service providers. This week, we take our first step towards understanding what goes on behind these policies, standards, and recommendations, and for that we have a well-equipped guest to walk us through it.

Zack Butcher is one of the founding engineers over at Tetrate, a vendor that provides a consistent way to connect and protect thousands of individual microservices and deliver Zero Trust security operations across any environment. They also have their roots stemming from a team that worked at Google, which many of you are likely familiar with their connection to Zero Trust through BeyondCorp. However, he is also the co-author on NIST special publication 800-207A. If that looks familiar, it’s because it’s an expansion of the earlier mentioned core NIST resource, 800-207.

NIST SP 800-207A builds upon that core architecture piece and hones in on access controls in cloud-native applications in multi-cloud environments. That is a bit of a mouthful, so here is Zack on what you need to know.

When we talk about Zero Trust at runtime, there's a lot of FUD and a frustrating amount of FUD in the in the marketplace and a lot of vendors claiming certain things are Zero Trust and not.

And you know, in that landscape, I wanted to really kind of push for people to have a very clear definition of Zero Trust at runtime, and it's a minimum definition. Let me be clear. You can do a whole lot more than what we talk about in the SP, but I try and give a very, very simple minimum definition. And that is five policy checks at runtime, and we call that identity based segmentation.

Butcher also co-authored NIST SP 800-204A that focuses on building secure microservices-based applications using service-mesh architecture. So this week, Neal and Butcher ran down the rabbit hole of expanding upon these core Zero Trust resources, implications of a more secure environment at runtime, and identity-based segmentation.

Hosted on Acast. See acast.com/privacy for more information.

Avsnitt(58)

Adopting Zero Trust with J. R. Cunningham: The Moat Has Dried Up

Adopting Zero Trust with J. R. Cunningham: The Moat Has Dried Up

This week we chat with J. R. Cunningham, Chief Security Officer at Nuspire, and we dig into Zero Trust as a journey. Nuspire is a managed security service provider that provides support ranging from m...

20 Okt 202248min

Adopting Zero Trust With Maureen Rosado: Selling Zero Trust

Adopting Zero Trust With Maureen Rosado: Selling Zero Trust

This week we chat with Maureen Rosado, a Zero Trust Strategist for BT, who has an outstanding history of business development for enterprise companies like IBM and Microsoft. This week we break away f...

6 Okt 202249min

Adopting Zero Trust with Christine Owen: Searching For the Finish Line

Adopting Zero Trust with Christine Owen: Searching For the Finish Line

This week we chat with Christine Owen, Director at Guidehouse, and we dig into Zero Trust as an approach to harden your identity and access management strategy, her dislike of passwords, and phishing-...

22 Sep 202259min

Adopting Zero Trust with Lexmark’s Bryan Willett: Culture of Security

Adopting Zero Trust with Lexmark’s Bryan Willett: Culture of Security

This week we chat with Bryan Willett, Lexmark’s CISO, who has built a legacy over the past 25 years working for the global company. Starting from his early days as a firmware developer, transitioning ...

8 Sep 202249min

Adopting Zero Trust with Dom Glavach: Staffing Up

Adopting Zero Trust with Dom Glavach: Staffing Up

This week we chat with Dom Glavach, Chief Security Officer (CSO) of CyberSN (Cyber Security Network) and a security consultant, and we dig into Zero Trust as a journey, the delta between buzzwords and...

25 Aug 202241min

Adopting Zero Trust With Nicolas Chaillan: From Policy to DHS

Adopting Zero Trust With Nicolas Chaillan: From Policy to DHS

Nicolas Chaillan is an Entrepreneur who became a US citizen about six years ago, and immediately joined the DHS where he became the chief architect and special advisor for cyber, leading him to become...

11 Aug 202244min

Adopting Zero Trust with Ryan Alford: IoT Secured

Adopting Zero Trust with Ryan Alford: IoT Secured

This week we chat with Ryan Alford, Founder and CEO of Engineering Design Group (EDG), and we dig into how Zero Trust impacts the future of hardware, software, IoT, and access (both human and machine)...

27 Juli 202247min

Adopting Zero Trust With Andrew Abel: Translating Zero Trust Into Business Concepts

Adopting Zero Trust With Andrew Abel: Translating Zero Trust Into Business Concepts

This week we chat with Andrew Abel, our defacto Zero Trust expert who is currently the EUC Cyber Security Strategy and Architecture Lead for an energy company out of Brisbane Australia.Andrew has been...

14 Juli 202242min

Populärt inom Teknik

uppgang-och-fall
bilar-med-sladd
elbilsveckan
market-makers
rss-technokratin
har-vi-akt-till-mars-an
skogsforum-podcast
rss-laddstationen-med-elbilen-i-sverige
rss-veckans-ai
rss-elektrikerpodden
developers-mer-an-bara-kod
bli-saker-podden
hej-bruksbil
rss-milpodden
rss-uppgang-och-fall
rss-en-ai-till-kaffet
rss-snacka-om-ai
natets-morka-sida
rss-it-sakerhetspodden
rss-powerboat-sverige-podcast