Â
The NIST, Department of Commerce ( DOC), and Tetrate Multi-Cloud Conference this year will concentrate on delivering Zero Trust Architecture (ZTA ) through application- and network-tier policies in a high-assurance service mesh operating environment. As a result, regardless of service or application location, whether on-premises or across multiple clouds, the enforcement of consistent, enterprise-wide policy is made possible.  , ++
To make sure that your organization’s security posture can fend off threats, we’ll examine the security challenges that public agencies encounter and offer insight into how to deal with them. We’ll also talk about infrastructure for giving applications tamper-proof cryptographic identities and API gateways, which are essential tools for achieving high assurance security for cloud-native applications. We’ll also talk about strategies for fostering trust throughout the entire application life cycle, including observability strategies, supply chain artifacts security, policy and infrastructure as code, and ongoing operational authorization.  ,
Experts in service mesh, ZTA, identity-centric security, open-source software development, and developing NIST Special Publications provide leadership and actionable insight during the conference program. The following topics will be covered in the presentations:  ,
-
methods for user authentication and access control for cloud-native applications in multi-cloud environments and nbsp, as well as for users, services, and devices.
-
The function of open source in cloud-native application compliance and security,
-
Best practices and typical ZTA  implementation pitfalls
Attending is encouraged for policymakers, business owners, students, and cybersecurity experts!  ,
Information about the workshop as of May 24, 2023
Free 2-hour Mesh Training  Service,
THE WORKSHOP REGISTRATION HAS BEENCLOSED. CAPACITY HAS BEEN REACHED,nbsp.
REGISTRATION FOR CONFERENCE IS STILL OPEN.
Introduction to Service Mesh with Istio and Envoy,  
Location: International Trade Center and Ronald Reagan Building, 1300 Pennsylvania Avenue, Suite 700, Washington, DC 20004.
 , Session 1: 00–2 :45 PM EDT ( maximum 55 registrants )
 , Session 2: 3:00–4 :45 PM EDT ( maximum 55 registrants )
The principles of zero trust can be implemented with the aid of a service mesh, which is both contemporary and potent. End-to-end encryption, attribute-based access control ( ABAC ), API threat detection and protection, and full audit histories with dashboards for continuous proof of compliance are all provided by this system’s dynamic, behavior based security to protect microservices, APIs and data.  , ++
To build in-app and user-level security permissions, encryption in transit, enhanced identity and access controls, and runtime observability—all of which are essential for achieving zero trust security in practice—you will learn the fundamentals of service mesh in this workshop. You will also receive hands-on training with Istio and Kubernetes.  , ++
We’ll discuss the theory underlying how the service mesh functions in between exercises, and throughout the workshop, you can virtually speak with experts in the field to get answers to your inquiries. You will be able to:  , with this knowledge and your real-world experience.
-
Recognize service mesh’s management capabilities for microservices and nbsp,
-
Recognize the high-level architecture and parts of technology solutions, such as Istio,  ,
-
Install a Kubernetes cluster and nbsp with the Istio service mesh.
-
Using the istioctl command line tool and nbsp, communicate with the service mesh
-
To track and troubleshoot microservices and nbsp, use Istio dashboards.
Presenters:Â Â
-
Software Engineer Matt Turner, Tetrate 
-
Founding Engineer Zack Butcher, Tetrate