Go offline with the Player FM app!
Interview with the Founder: Zero Trust Model founder, John Kindervag
Manage episode 475482353 series 3342345
In this episode of Radio Cloud Native, former host John Jainschigg, Director of Open Source Initiatives for Mirantis, returns to provide a great interview with one of the founders of the Zero Trust model for cybersecurity, John Kindervag. He has authored many blog articles and much of the open source documentation of Zero Trust, and is one of the most knowledgeable cybersecurity experts in the cloud space.
In the interview, you will hear directly from John Kindervag about how the Zero Trust model was initially created, how it has evolved over the years, how it can actually be implemented into a realistic, enterprise security framework, and a host of examples of why Zero Trust may be an ideal security posture for your Org. John's responses touch on both the technical development and operations side, serving as a valuable resource for a variety of IT professionals and software hobbyists.
A full list of what's discussed in the interview:
- Cybersecurity landscape before Zero Trust
- Concept of "trust" in Zero Trust model
- Zero Trust - technical POV
- Zero trust and the Principle of Least Privilege
- Implementing Zero Trust
- Defense in Depth vs Zero Trust
- Zero Trust streamlines cybersecurity
- AWS S3 Gateway vulnerability example
- Application vs Infrastructure security
- Securing Apps under Zero Trust
- Achieving Zero Trust
If you want to listen to more episodes of Radio Cloud Native, please visit https://www.mirantis.com/radiocloudnative/ to download, or find them wherever you prefer to consume your podcasts.
If you are interested in contributing to Radio Cloud Native, please reach out to our podcast team: [email protected]
Chapters
1. Intro (00:00:00)
2. Q: Before Zero Trust, what were the dominate models for cybersecurity? (00:01:31)
3. Q: Why is the concept of "trust" problematic in cybersecurity? (00:02:48)
4. Q: How does Zero Trust work from a technical perspective? (00:09:11)
5. Q: How does this relate to the principle of least privilege? (00:11:49)
6. Q: How do you implement Zero Trust in the real world? (00:13:11)
7. Q: How is Defense in Depth different from Zero Trust? (00:15:55)
8. Q: How does Zero Trust simplify & enhance the cybersecurity process? (00:20:18)
9. Real World Example: AWS S3 Gateway Attacked (00:22:49)
10. Application vs Infrastructure security under Zero Trust (00:25:00)
11. Q: Who is responsible for securing Apps under Zero Trust? (00:26:18)
12. Zero Trust is achievable (00:29:29)
13. Outro (00:31:49)
63 episodes
Manage episode 475482353 series 3342345
In this episode of Radio Cloud Native, former host John Jainschigg, Director of Open Source Initiatives for Mirantis, returns to provide a great interview with one of the founders of the Zero Trust model for cybersecurity, John Kindervag. He has authored many blog articles and much of the open source documentation of Zero Trust, and is one of the most knowledgeable cybersecurity experts in the cloud space.
In the interview, you will hear directly from John Kindervag about how the Zero Trust model was initially created, how it has evolved over the years, how it can actually be implemented into a realistic, enterprise security framework, and a host of examples of why Zero Trust may be an ideal security posture for your Org. John's responses touch on both the technical development and operations side, serving as a valuable resource for a variety of IT professionals and software hobbyists.
A full list of what's discussed in the interview:
- Cybersecurity landscape before Zero Trust
- Concept of "trust" in Zero Trust model
- Zero Trust - technical POV
- Zero trust and the Principle of Least Privilege
- Implementing Zero Trust
- Defense in Depth vs Zero Trust
- Zero Trust streamlines cybersecurity
- AWS S3 Gateway vulnerability example
- Application vs Infrastructure security
- Securing Apps under Zero Trust
- Achieving Zero Trust
If you want to listen to more episodes of Radio Cloud Native, please visit https://www.mirantis.com/radiocloudnative/ to download, or find them wherever you prefer to consume your podcasts.
If you are interested in contributing to Radio Cloud Native, please reach out to our podcast team: [email protected]
Chapters
1. Intro (00:00:00)
2. Q: Before Zero Trust, what were the dominate models for cybersecurity? (00:01:31)
3. Q: Why is the concept of "trust" problematic in cybersecurity? (00:02:48)
4. Q: How does Zero Trust work from a technical perspective? (00:09:11)
5. Q: How does this relate to the principle of least privilege? (00:11:49)
6. Q: How do you implement Zero Trust in the real world? (00:13:11)
7. Q: How is Defense in Depth different from Zero Trust? (00:15:55)
8. Q: How does Zero Trust simplify & enhance the cybersecurity process? (00:20:18)
9. Real World Example: AWS S3 Gateway Attacked (00:22:49)
10. Application vs Infrastructure security under Zero Trust (00:25:00)
11. Q: Who is responsible for securing Apps under Zero Trust? (00:26:18)
12. Zero Trust is achievable (00:29:29)
13. Outro (00:31:49)
63 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.