
Sign up to save your podcasts
Or
Once you have defined a few protect surfaces (see: Step 1 of Zero Trust-video link below), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another.
Understanding how data travels to, from and around protect surfaces is your next logical movie. Why? Because if you don’t know how your systems talk to each other, you can’t secure them.
In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas discuss how to identify communication paths between protect surfaces and why this visibility is critical for both risk containment and policy validation.
They explore:
✅ How to identify communication paths
⛕The difference between inbound and outbound traffic (and why this matters)
🙋🏼♂️Why business owners and business context are essential
Get all the details and
insights on this second step of Zero Trust: mapping the transaction flows.
Additional Resources:
► Zero Trust Step One: https://youtu.be/mC66i-tEEFs
Once you have defined a few protect surfaces (see: Step 1 of Zero Trust-video link below), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another.
Understanding how data travels to, from and around protect surfaces is your next logical movie. Why? Because if you don’t know how your systems talk to each other, you can’t secure them.
In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas discuss how to identify communication paths between protect surfaces and why this visibility is critical for both risk containment and policy validation.
They explore:
✅ How to identify communication paths
⛕The difference between inbound and outbound traffic (and why this matters)
🙋🏼♂️Why business owners and business context are essential
Get all the details and
insights on this second step of Zero Trust: mapping the transaction flows.
Additional Resources:
► Zero Trust Step One: https://youtu.be/mC66i-tEEFs