{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":90,"width":600,"title":"Aaron Palermo: Zero Trust Networking - Episode 196","description":"Aaron is a DevOps engineer, solution architect, and all-around cybersecurity expert. He works for a global cybersecurity services company, is a member of the Cloud Security Alliance, and is a co-author of the up-and-coming Software Defined Perimeter Specification Version 2. Since last time (episode 18), Aaron was 1.5 years overseas supporting the Army and moved back to the U.S. last year to join Appgate as a Senior Solutions Architect. &amp;nbsp; Topics of Discussion: [4:11] What types of things has Aaron observed that programmers don\u2019t typically gravitate towards, but they need to give some attention to in just the overall IT and security space? [9:42] Should developers be thinking about zero trust just for their production environments, or should they be thinking about it for their own working environments, as well? [13:30] Is there a standard set of tags that someone could use from day one? [15:15] A core tenet of Zero Trust is Enterprise Identity Governance. [17:35] Do the cloud providers already have this mechanism of automatically discovering via tags and\/or is there something that needs to be added to what they provide? [22:36] What are the pros and cons of working with smaller vs. bigger companies? [24:41] What does Aaron see for the future? &amp;nbsp; Mentioned in this Episode:  Architect Tips \u2014 New video podcast!  Azure DevOps Clear Measure (Sponsor)  .NET DevOps for Azure: A Developer\u2019s Guide to DevOps Architecture the Right Way, by Jeffrey Palermo \u2014 Available on Amazon!  Jeffrey Palermo\u2019s YouTube  Jeffrey Palermo\u2019s Twitter \u2014 Follow to stay informed about future events!  Appgate \u2014 The leader in Zero Trust Network Access solutions  Zero Trust Thirty   EO 14028 \u2014 Executive Order on Improving the Nation\u2019s Cybersecurity  Presidential memo on Moving the U.S. Government Toward Zero Trust Cybersecurity Principles CISA\u2019s focus on Zero Trust \u2014 508 search results  CISA\u2019s Zero Trust Maturity Model document  NIST \u2014 Implementing Zero Trust Architecture  Cloud Security Alliance \u2014 Software Defined Perimeter and Zero Trust Platform One \u2014 \u201cAn official DoD DevSecOps Enterprise Services team for the DoD\u201d leveraging CNAP for secure remote access to cloud resources.  Department of Defense (DoD) Cloud Native Access Point (CNAP) Reference Design (RD)  &amp;nbsp; Want to Learn More? Visit AzureDevOps.Show for show notes and additional episodes. ","author_name":"AI DevOps Podcast","author_url":"https:\/\/azuredevopspodcast.clear-measure.com","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/23334647\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/0072be\/\" height=\"90\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/item\/23334647"}