Nov 30, 2022

Zero Effort Zero Trust for Blocking Zero Days in Kubernetes


Let's learn the zero trust segmentation for network, process, and file access within K8s cluster with Tracy Walker. 


Threat-Based Controls Zero-Trust Controls
CVEs Automated Learning
DLP Network
Network Attacks Process
OWASP Top 10 WAF File Access
Admission Control Security as Code



The Automated Behavioral-based Zero-Trust covers:

  • Discover mode - identifies apps behavior (learning mode)
  • Monitor mode - alerts to any anomalous app behavior
  • Protect mode - denies on any anomalous app behavior

 

The demo will show how Zero Trust can protect against zero-day attacks as well as exploits such as Log4j and Spring4shell.


Links: