Past the Perimeter: Earned Access Through A Zero-Trust Model

Past the Perimeter: Earned Access Through A Zero-Trust Model

How should companies cope with employees becoming more mobile and working outside the office? Learn about the zero-trust maturity model Duo used to deal with these security concerns and the strategies they adopted.

About this course

Users whose digital lives are increasingly mobile don’t want to be tied to their desks, and an effective security strategy must be flexible enough to protect access from boardrooms and bars, cubicles and coffee shops alike. To do this, companies must ensure that users and their devices meet the same security controls, whether they’re outside or inside the network perimeter.


Duo adopted the “zero-trust network” model to solve this challenge. All networks and devices are treated as untrusted until proven otherwise, and their health is checked each time a user connects to a protected resource. This approach depends on visibility into whether basic device and network security standards are met. It also requires the ability to enforce granular policy controls based on the results of that health check.


The perimeter is disappearing, and it’s not coming back… find out how you can get a head start on what’s next.

 

 

This Webinar covers material related to domain 2: Governance and ERM, domain 4: Compliance and Audit Management, and domain12: Identity, Entitlement and Access Management from CSA's Security Guidance available for download here: https://cloudsecurityalliance.org/research/guidance/ 

 

 

For more webinars on cloud security content, don't forget to check out Cloud Security Alliance's CloudBytes channel on BrightTalk at https://www.brighttalk.com/channel/10415/

Curriculum

  • Introduction to Past the Perimeter
  • Video
  • Summary of Past the Perimeter

About this course

Users whose digital lives are increasingly mobile don’t want to be tied to their desks, and an effective security strategy must be flexible enough to protect access from boardrooms and bars, cubicles and coffee shops alike. To do this, companies must ensure that users and their devices meet the same security controls, whether they’re outside or inside the network perimeter.


Duo adopted the “zero-trust network” model to solve this challenge. All networks and devices are treated as untrusted until proven otherwise, and their health is checked each time a user connects to a protected resource. This approach depends on visibility into whether basic device and network security standards are met. It also requires the ability to enforce granular policy controls based on the results of that health check.


The perimeter is disappearing, and it’s not coming back… find out how you can get a head start on what’s next.

 

 

This Webinar covers material related to domain 2: Governance and ERM, domain 4: Compliance and Audit Management, and domain12: Identity, Entitlement and Access Management from CSA's Security Guidance available for download here: https://cloudsecurityalliance.org/research/guidance/ 

 

 

For more webinars on cloud security content, don't forget to check out Cloud Security Alliance's CloudBytes channel on BrightTalk at https://www.brighttalk.com/channel/10415/

Curriculum

  • Introduction to Past the Perimeter
  • Video
  • Summary of Past the Perimeter