![]() It provides dynamic, behavior-based security to protect microservices, APIs, and data, including end-to-end encryption, attribute-based access control (ABAC), API threat detection and protection, and full audit histories with dashboards for continuous proof of compliance. Session 2: 3:00 - 4:45PM EDT (max 55 registrants)Ī service mesh is a modern and powerful tool for implementing the tenets of zero trust. Session 1: 1:00 - 2:45PM EDT (max 55 registrants) Location: Ronald Reagan Building and International Trade Center, 1300 Pennsylvania Ave, Suite 700, Washington, DC 20004 Name: Introduction to Service Mesh with Istio and Envoy Policymakers, entrepreneurs, students, and cybersecurity professionals are encouraged to attend! workshop information - may 24, 2023 The role of open source in cloud-native application security and complianceīest practices and common pitfalls for implementing ZTA NIST recommendations for realizing zero trust principles in cloud-native applications and for securing artifacts in software supply chainsĪpproaches for authentication and access control for users, services, and devices in cloud-native applications in multi-cloud environments Presentations will cover a wide range of topics, including: The conference program features both leadership and actionable insight from experts in service mesh, ZTA, identity-centric security, open-source software development, and emerging NIST Special Publications. We will further discuss techniques for instilling trust in the entire application life cycle, such as securing supply chain artifacts, policy and infrastructure as code, continuous authorization to operate, and observability strategies. We will also discuss critical tools for achieving high assurance security for cloud-native applications, including API gateways and infrastructure for assigning tamper-proof cryptographic identities to applications. We’ll look at security challenges that public agencies face and provide insight and know-how to address them to ensure that your agency’s security posture can protect against threats. This makes the enforcement of consistent, enterprise-wide policy a reality irrespective of service or application location, whether on-premises or across multiple clouds. ![]() This year’s Multi-Cloud Conference hosted by NIST, Department of Commerce (DOC), and Tetrate will focus on delivering Zero Trust Architecture (ZTA) through application-tier and network-tier policies in a high-assurance service mesh operating environment.
0 Comments
Leave a Reply. |