Emerging Trends
W4-2D. Deploy Identity-based Zero Trust, but Keep the Firewall!
Wednesday, June 12, 2024 2:30 PM - 3:30 PM
Room 2DE
Let’s get beyond the hype, and stop thinking that Zero Trust mandates the complete destruction and rebuilding of our security expertise, processes, and tools. This session will focus on one of the primary three architectures for Zero Trust (per NIST 800-207): Enhanced Identity Governance. As part of that architecture, we’ll evaluate how all of the following “legacy” security programs converge including: - Identity and Access Management - Architecture - Endpoint Detection and Response (EDR) - Network Security (Firewalls) - Public Key Infrastructure (PKI) Then, we’ll incorporate how the Policy Enforcement Points (PEPs) and Policy Decision Points (PDPs) work with trust algorithms to orchestrate the real-time decisions for data access.
After this session, learner will be able to.. - Identify key components of their existing security program that are foundations or components to Enhanced Identity Governance, - Identify opportunities for applying principles from Enhanced Identify Governance into their security program, - Explain how Policy Enforcement Points (PEPs) can be used to reduce risk without negatively impacting the user experience, - Cite the source of NIST guidance for Zero Trust (800-207) and its multiple architectures, and - Emphasize that Zero Trust is not a tool.