Let's learn the zero trust segmentation for network, process, and file access within K8s cluster with Tracy Walker.
Threat-Based Controls | Zero-Trust Controls |
---|---|
CVEs | Automated Learning |
DLP | Network |
Network Attacks | Process |
OWASP Top 10 WAF | File Access |
Admission Control | Security as Code |
The Automated Behavioral-based Zero-Trust covers:
- Discover mode - identifies apps behavior (learning mode)
- Monitor mode - alerts to any anomalous app behavior
- Protect mode - denies on any anomalous app behavior
The demo will show how Zero Trust can protect against zero-day attacks as well as exploits such as Log4j and Spring4shell.
Links: