Zero Trust Security and Identity Management with Boundary

preview_player
Показать описание
Modern systems and applications are built around resources that require frequent access by users who may be a developer, DevOps engineer, SRE, or sysadmin in the public domain. These resources often reside in private networks that are inaccessible from an outside network. Traditional approaches such as VPNs, bastion hosts, and gateway nodes are often chosen to bridge connections between private and public networks, but these are complex and expensive to setup. Further, individual credentials for each resource (DB credentials, SSH keys, etc.) need to be shared with users. This is not a recommended practice in software development and may result in security breach.

In this context, I will be discussing about the open source tool HashiCorp Boundary, which aims to abstract away much of the complexity by providing a linear approach in granting and maintaining access to infrastructure resources.

Speaker: Suman Chakraborty
GitHub: @suchakra012
Twitter: @itsmesumanc

#Boundary #Multi-cloud #ZeroTrustSecurity

HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp open source tools Vagrant, Packer, Terraform, Vault, Consul, Nomad, Boundary, and Waypoint allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices.

Twitter: @hashicorp
Рекомендации по теме