We'll be giving away some free devices, so make sure you're there early!
The nature of application delivery now spans public and private clouds and edge computing, while the end clients accessing these applications are people and machines. Securing these diverse environments while maintaining productivity and minimizing errors is challenging, to say the least. The classic models of arranging everything inside a perimeter, whether this is a private DC or a virtual private cloud (VPC), and providing access over a VPN are falling apart under the weight of complexity and inadequacy.
In this talk we will dive into an identity based model for providing access to users, whether it is to Web-type applications over REST APIs, or infrastructure itself through SSH and RDP. Starting from the principals of an OAUTH/OIDC infrastructure, we will discuss how the concepts can be extended to cover all forms of remote access without the overhead of VPNs and bastion hosts and while maintaining a zero trust security posture. Some of the use cases of this approach include:
- Privileged access management (SSH or RDP access to VMs)
- Authorization for web-services
- User specific access to Cloud Provider resources (i.e. AWS S3 buckets) while maintaining audit trails.
5:30pm Networking & Food
6pm Presentation starts
7pm Q&A, discussion
8pm End (or sooner)