ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

USENIX Enigma 2020 - BeyondProd: The Origin of Cloud-Native Security at Google

Автор: USENIX Enigma Conference

Загружено: 2020-03-10

Просмотров: 1376

Описание: BeyondProd: The Origin of Cloud-Native Security at Google

Brandon Baker, Google

Containers and microservices are increasingly being used to deploy applications, and with good reason, given their portability, simple scalability and lower management burden. In changing from an architecture based on monolithic applications to one using distributed microservices, known as a "cloud-native" architecture, there are changes not only to operations but also to security.

Where BeyondCorp states that user trust should be dependent on characteristics like the context-aware state of devices and not the ability to connect to the corp network, BeyondProd states that service trust should be dependent on characteristics like code provenance and service identity, not the location in the production network, such as IP or hostname identity.

Just like the security model evolved beyond the castle walls with BeyondCorp, BeyondProd proposes a cloud-native security architecture that assumes no trust between services, provides isolation between multi-tenant workloads, verifiable enforcement of what applications are deployed, automated vulnerability management, and strong access controls to critical data. These principles led Google to innovate several new systems in order to meet these requirements.

In this talk, we will cover what a cloud-native architecture is, and why it's different from a security point of view; design principles for security in a cloud-native world; how Google addressed these requirements and the internal tools used as part of this architecture; and how your organization might approach the same requirements. You'll come away with a better understanding of how to think about cloud-native security, and more capably decide what tools you might need to secure your infrastructure.

Sign up to find out more about Enigma at https://enigma.usenix.org

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
USENIX Enigma 2020 - BeyondProd: The Origin of Cloud-Native Security at Google

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

USENIX Enigma 2020 - Bringing Usable Crypto to 7 Million Developers

USENIX Enigma 2020 - Bringing Usable Crypto to 7 Million Developers

USENIX Enigma 2020 -The Abuse Uncertainty Principle, ...

USENIX Enigma 2020 -The Abuse Uncertainty Principle, ...

USENIX Enigma 2020 - Encrypted Messaging (Panel)

USENIX Enigma 2020 - Encrypted Messaging (Panel)

Kubernetes — Простым Языком на Понятном Примере

Kubernetes — Простым Языком на Понятном Примере

USENIX Enigma 2023 - Meaningful Hardware Privacy for a Smart and Augmented Future

USENIX Enigma 2023 - Meaningful Hardware Privacy for a Smart and Augmented Future

Yandex Cloud Detection and Response: что нового в сервисе

Yandex Cloud Detection and Response: что нового в сервисе

USENIX Enigma 2023 - Characterizing and Measuring Misleading and Harmful Online Ad Content at Scale

USENIX Enigma 2023 - Characterizing and Measuring Misleading and Harmful Online Ad Content at Scale

Complete Entra PIM Demonstration

Complete Entra PIM Demonstration

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

USENIX Enigma 2023 - Adventures in Authentication and Authorization

USENIX Enigma 2023 - Adventures in Authentication and Authorization

Как Ubuntu Предала Linux - Вся Правда о Взлёте и Падении Canonical

Как Ubuntu Предала Linux - Вся Правда о Взлёте и Падении Canonical

КТО на самом ДЕЛЕ контролирует ДАРКНЕТ в 2026-м году?

КТО на самом ДЕЛЕ контролирует ДАРКНЕТ в 2026-м году?

Rob Joyce Interview -  Linux Critical Infrastructure Threats

Rob Joyce Interview - Linux Critical Infrastructure Threats

Лучший Гайд по Kafka для Начинающих За 1 Час

Лучший Гайд по Kafka для Начинающих За 1 Час

USENIX Enigma 2023 - Why Is Our Security Research Failing? Five Practices to Change!

USENIX Enigma 2023 - Why Is Our Security Research Failing? Five Practices to Change!

USENIX Enigma 2023 - Understanding Trust & Security Processes in the Open Source Software Ecosystem

USENIX Enigma 2023 - Understanding Trust & Security Processes in the Open Source Software Ecosystem

Архитектура интернета и веба | Теоретический курс 2026

Архитектура интернета и веба | Теоретический курс 2026

Java Performance Update: From JDK 21 to JDK 25

Java Performance Update: From JDK 21 to JDK 25

Музыка для работы - Deep Focus Mix для программирования, кодирования

Музыка для работы - Deep Focus Mix для программирования, кодирования

Учёные в Давосе 2026: жесткий спор о безопасности и AGI

Учёные в Давосе 2026: жесткий спор о безопасности и AGI

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]