Least Privilege Access and Zero Trust
Hosts Sydney Rossman-Reich, VP of Marketing, and Jordan Glasner, Director of Product, walk through Least Privilege Access and how to implement this using Tailscale. As part of our multi-part series on migrating to a Zero Trust architecture, we cover Least Privilege Access and related topics such as micro-segmentation and continuous verification.
Webinar Description
As part of our multi-part series on migrating to a Zero Trust architecture, we cover connecting all your network resources. A fundamental part of the zero-trust process is creating secure, encrypted connections between all your devices and servers. We walk you through building a plan for implementing those connections no matter what kind of fleet of devices you use or where your servers are hosted.We will walk you through building a plan for implementing Least Privilege Access and related Zero Trust principles no matter what kind of fleet of devices you use or where your servers are hosted.
Focusing on how Tailscale can help with all of this, we touched on the following features that make it possible to create connections to everything including:
- Infrastructure agnostic
- Adaptive policies with ACLs
- App Connectors
- Subnet Routers
- Device Posture Management
Missed part one? Check it out here.
