Zero Trust Webinar Series: Part Two (Least Privileged Access)
As part of our multi-part series on migrating to a Zero Trust architecture, we will cover Least Privileged Access and related topics such as micro-segmentation and continuous verification. A fundamental part of the zero-trust process is ensuring access to your infrastructure is granted based on verified identity, role, and real-time context and that users and workloads are isolated to prevent unrestricted movement across your network. Access permissions should be constantly re-evaluated based on real-time signals.
We will walk you through building a plan for implementing Least Privileged Access and related Zero Trust principles no matter what kind of fleet of devices you use or where your servers are hosted.
Focusing on how Tailscale can help with all of this, we will touch on the following features that make it possible to create connections to everything including:
- Infrastructure agnostic
- Adaptive policies with ACLs
- App Connectors
- Subnet Routers
- Device Posture Management


Zero Trust Networking with Tailscale
This webinar series will provide an overview of how to implement a zero-trust environment at your workplace and will cover the following topics:
- Connectivity to anything
- Micro-segmentation
- Least privileged access
- Monitoring and analysis
- Adaptive policies
We will review guidance on how to implement these policies at your workplace and discuss how Tailscale is uniquely positioned to help with each of these areas. Sign up for the second session on April 23.
The second topic we will cover is Least Privileged Access and related topics: micro-segmentation and continuous verification. Zero Trust relies on ensuring only the right users have access to the right parts of your infrastructure at the right time. Whether you are all in on one cloud, have a hybrid approach, or are multi-cloud, we have you covered, walking you through how to establish the perfect access architecture.

