Ambassador
Elaine Doyle
Principal Architect - Data Security Architecture
United StatesVerified Community AmbassadorContent Elaine is Following
Is your team entirely located in the same time zone?
Yes
No
4.4k views1 Comment
Is your business worried about friendly fraud?
Yes
No
4.5k views2 Upvotes1 Comment
What is the next generation of strong and secure service to service communications looking like? Currently the sliding scale looks like the below.... [Strongest to Minimum Bar]: 1. mTLS via Managed Service Mesh: The highest security option, ensuring mutual authentication, encryption, and observability. It’s ideal for containerized microservices or distributed services needing automated security management. 2. mTLS + A Private Link: Provides secure, private network communication for internal data and secures data transfer over private networks with endpoint verification. 3. mTLS + an Ingress Gateway: Protects external service traffic with mutual authentication and encryption, securing public-facing services. 4. mTLS + IP Allow-Listing: Combines IP-based access control with mTLS to meet minimum compliance standards, suitable for lower-risk internal services with known IP addresses. T5. LS + JWT (Token-Based Authentication): Useful when mTLS isn’t feasible, combining TLS with JWT tokens for scalable, multi-cloud security and suitable for stateless applications or complex certificate management environments.-Strongest: Managed Service Mesh (where at all possible) since this enforces mTLS on all communication.
67 views
Are there any successful examples of Zero Trust Networks deployment? Specifically, has this model been applied in the retail industry?
268 views2 Comments
See page 20 of the NIST CSF ZT guide
https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.pdf
Most ...read more