OPERATING SYSTEMSOS Linux

LF Live Webinar: The Evolution of Zero-Trust Techniques with Workload-Level Identity

Sponsored by Outshift by Cisco

Zero trust solutions are rapidly gaining traction and becoming more prevalent in ensuring secure communication from one workload to another. At its core, this model operates on a simple yet profound principle: “Never Trust, Always Verify.” But how do we implement this? While many zero-trust solutions for workloads lean on network segmentation techniques, or service meshes, our approach is different. In this session, we’ll explore the rationale and the technology behind our open source, Linux Kernel module-based approach. We will demonstrate how our system manages the automatic binding of identities, incorporating advanced encryption and access control mechanisms.

source

by The Linux Foundation

linux foundation