Zero Trust

Enabling Global Data Communication

Hello from

Meet Eliza & Marvin

 

Security of the Past: Limitations

only protection of bilateral IP connections

 

not protecting different data objects, but apis

 

unsuited for rapid change of data owners / new data channels

Security of the Past: Limitations

Security of the Past: Limitations

static design: build once, run forever

 

new requirements vs. security design

 

introduce security exceptions on change

Security of the Future: ZeroTrust

trust perimeter has changed

 

fragmented information (flows) need protection

 

authn/authz must be possible everywhere

 

data objects governed by external/internal access policies (AP)

Security of the Future: ZeroTrust

Security of the Future: ZeroTrust

defines trust levels for data objects / smaller groups

 

fine grained access to objects possible

 

more insights means minimizing risk

 

Never trust, always verify

Security for complex Ecosystems:

Zero Trust / Access Policies

data object interactions main driver for future IT architecture

 

devices produce and consume data at the same time

 

respect different data owners per device

 

if one fails, all suffer!

Security of Ecosystems:

Zero Trust / IDSA / AccessPolicies

Security of Ecosystems:

Zero Trust /Access Policies

business agility: enables your company to adapt and survive

 

switch to a different service provider is easy

 

change policies in days (rather than months)

 

enables data reduction and data economy

Reliability

Legal

Economic

Environment

Social

Approaches

Your Experience?

Tabelle
api gateways

versch. technische Komponenten & Einsatzzwecke

B2B Mesh

Security First:

digital identities

dual encryption layer

attribute based access control

decentralized access delegation

 

... and more

Privacy First:

stacked identities (realm / audience)

addressing hash based

DHT to protect metadata discovery

 

 

... and more

Easy to use

installed as a OS library

connect once, communicate globally

python / lua binding available

identity / data based routing

 

 

... and more

no more gateways

decentralized
P2P networks

decentralized
P2P networks

Trusted B2B mesh network

Benefits

stay secure behind closed firewalls

 

standardized security measures

 

limit packet size / throughput

 

"blind broker" nodes

Trusted B2B mesh network

 

connects everything:

 

devices, edge, processes,

applications, users, enterprises

...

Neuropil

Cooperation, dialogue, contribution etc.

s. Fosdem 2019 Abschluss Slide

Let's
chat!

Backup-202006 Zero Trust: An Introduction

By Stephan Schwichtenberg

Backup-202006 Zero Trust: An Introduction

a short introduction to the neuropil messaging layer

  • 134