Tech
June 8

Implementing zero trust architecture with Context-Aware-Proxy

Learn about the benefits of Zero Trust Architecture: A security framework based on continuous monitoring and the principle of least privilege, moving your first internal site to the internet with Context-Aware-Proxy.
Talk abstract

This talk will discuss the principles and benefits of ZTA, including the use of least privilege and continuous monitoring to limit potential damage caused by breaches or insider threats. We'll explore the various components of a ZTA model, such as identity and access management, network segmentation, and behavioural analytics. We'll also walk through an exercise with a Context-Aware-Proxy to see how it can help enforce ZTA. Finally, we'll discuss the challenges and considerations involved in implementing ZTA and how it can help organizations better protect their sensitive data and assets.

The session will cover:

  • The purpose and benefit of ZTA
  • How Identity Aware Proxy can help free up your VPN
  • A local example of Context-Aware-Proxy with Kubernetes+Nginx+Sso