-
S406 - Zero Trust in People and Machines – It’s not just AI we need to fear
Primarily: The NIST publications for establishing a Zero Trust Architecture (ZTA) can be overwhelming but the basic concept of creating a ZTA is based upon common-sense steps and practices that can be applied to the most critical controls for z/OS. Remember you are dealing with people. In the primary part of this overall session, we will discuss a practical approach to creating and providing the two basic elements required in a ZTA, the Policy Decision Point (PDP) and the Policy Enforcement Point (PEP).
A "quick dive": With machine identities we need to know of potential critical vulnerabilities in SSL/TLS Connections to server end-points, all end-points, across the entire z/Fabric. And with new regulatory concerns and possible processing exposures, to expand the role of key rings, certificates, related ESM profiles and ICSF controls to achieve a Secure Boot of z/OS.For sure: “Bad Actors” are out there using whatever means necessary to upset the status quo.


