Skip to main content
eScholarship
Open Access Publications from the University of California

Zero Trust, and verify - Zeek

Creative Commons 'BY' version 4.0 license
Abstract

In this talk we highlight how Zeek can play a crucial role in enabling various tenets of Zero-Trust. We start with looking at fundamental design goals of Zeek itself from the time when Zero-trust was not even a buzzword. We further discuss Zero Trust security models – specifically the Networking Piller – and how Zeek can facilitate Zero Trust postures of visibility, automation and analytics. At the end of this talk we focus on Zeek’s challenges in optimal zero trust implementation and discuss possible solutions.

Main Content
For improved accessibility of PDF content, download the file to your device.
Current View