Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Mirantis Inc.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mirantis Inc. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Interview with the Founder: Zero Trust Model founder, John Kindervag

31:59
 
Share
 

Manage episode 475482353 series 3342345
Content provided by Mirantis Inc.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mirantis Inc. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of Radio Cloud Native, former host John Jainschigg, Director of Open Source Initiatives for Mirantis, returns to provide a great interview with one of the founders of the Zero Trust model for cybersecurity, John Kindervag. He has authored many blog articles and much of the open source documentation of Zero Trust, and is one of the most knowledgeable cybersecurity experts in the cloud space.

In the interview, you will hear directly from John Kindervag about how the Zero Trust model was initially created, how it has evolved over the years, how it can actually be implemented into a realistic, enterprise security framework, and a host of examples of why Zero Trust may be an ideal security posture for your Org. John's responses touch on both the technical development and operations side, serving as a valuable resource for a variety of IT professionals and software hobbyists.

A full list of what's discussed in the interview:

  • Cybersecurity landscape before Zero Trust
  • Concept of "trust" in Zero Trust model
  • Zero Trust - technical POV
  • Zero trust and the Principle of Least Privilege
  • Implementing Zero Trust
  • Defense in Depth vs Zero Trust
  • Zero Trust streamlines cybersecurity
  • AWS S3 Gateway vulnerability example
  • Application vs Infrastructure security
  • Securing Apps under Zero Trust
  • Achieving Zero Trust

If you want to listen to more episodes of Radio Cloud Native, please visit https://www.mirantis.com/radiocloudnative/ to download, or find them wherever you prefer to consume your podcasts.

If you are interested in contributing to Radio Cloud Native, please reach out to our podcast team: [email protected]

  continue reading

Chapters

1. Intro (00:00:00)

2. Q: Before Zero Trust, what were the dominate models for cybersecurity? (00:01:31)

3. Q: Why is the concept of "trust" problematic in cybersecurity? (00:02:48)

4. Q: How does Zero Trust work from a technical perspective? (00:09:11)

5. Q: How does this relate to the principle of least privilege? (00:11:49)

6. Q: How do you implement Zero Trust in the real world? (00:13:11)

7. Q: How is Defense in Depth different from Zero Trust? (00:15:55)

8. Q: How does Zero Trust simplify & enhance the cybersecurity process? (00:20:18)

9. Real World Example: AWS S3 Gateway Attacked (00:22:49)

10. Application vs Infrastructure security under Zero Trust (00:25:00)

11. Q: Who is responsible for securing Apps under Zero Trust? (00:26:18)

12. Zero Trust is achievable (00:29:29)

13. Outro (00:31:49)

63 episodes

Artwork
iconShare
 
Manage episode 475482353 series 3342345
Content provided by Mirantis Inc.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mirantis Inc. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of Radio Cloud Native, former host John Jainschigg, Director of Open Source Initiatives for Mirantis, returns to provide a great interview with one of the founders of the Zero Trust model for cybersecurity, John Kindervag. He has authored many blog articles and much of the open source documentation of Zero Trust, and is one of the most knowledgeable cybersecurity experts in the cloud space.

In the interview, you will hear directly from John Kindervag about how the Zero Trust model was initially created, how it has evolved over the years, how it can actually be implemented into a realistic, enterprise security framework, and a host of examples of why Zero Trust may be an ideal security posture for your Org. John's responses touch on both the technical development and operations side, serving as a valuable resource for a variety of IT professionals and software hobbyists.

A full list of what's discussed in the interview:

  • Cybersecurity landscape before Zero Trust
  • Concept of "trust" in Zero Trust model
  • Zero Trust - technical POV
  • Zero trust and the Principle of Least Privilege
  • Implementing Zero Trust
  • Defense in Depth vs Zero Trust
  • Zero Trust streamlines cybersecurity
  • AWS S3 Gateway vulnerability example
  • Application vs Infrastructure security
  • Securing Apps under Zero Trust
  • Achieving Zero Trust

If you want to listen to more episodes of Radio Cloud Native, please visit https://www.mirantis.com/radiocloudnative/ to download, or find them wherever you prefer to consume your podcasts.

If you are interested in contributing to Radio Cloud Native, please reach out to our podcast team: [email protected]

  continue reading

Chapters

1. Intro (00:00:00)

2. Q: Before Zero Trust, what were the dominate models for cybersecurity? (00:01:31)

3. Q: Why is the concept of "trust" problematic in cybersecurity? (00:02:48)

4. Q: How does Zero Trust work from a technical perspective? (00:09:11)

5. Q: How does this relate to the principle of least privilege? (00:11:49)

6. Q: How do you implement Zero Trust in the real world? (00:13:11)

7. Q: How is Defense in Depth different from Zero Trust? (00:15:55)

8. Q: How does Zero Trust simplify & enhance the cybersecurity process? (00:20:18)

9. Real World Example: AWS S3 Gateway Attacked (00:22:49)

10. Application vs Infrastructure security under Zero Trust (00:25:00)

11. Q: Who is responsible for securing Apps under Zero Trust? (00:26:18)

12. Zero Trust is achievable (00:29:29)

13. Outro (00:31:49)

63 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play