Implementing zero trust principles in IBM Cloud Pak for Integration involves several key aspects:
1. Treating all identities (users, applications, components, administrators) as untrusted and establishing an identity perimeter.
2. Minimizing privileges by restricting what actions containers and service accounts can perform and limiting their access to secrets, the Kubernetes API, and the underlying operating system.
3. Implementing defense in depth across the network, with microsegmentation between environments, applications, and tiers to control inter-pod and inter-tier communication.
6. IBM Cloud Pak for Integration
IBM Z
IBM LinuxOne
IBM Power Systems
End
points
IBM
Cloud
AWS Private
Google
Cloud VMware
Microsoft
Azure
Cloud Pak for Integration
Enterprise
messaging
End-to-end
security
Application
integration
Event
streaming
High speed
data transfer
API
management
7. Two perspectives on how zero trust affects Cloud Pak for Integration
1. How customers use the product
Cloud Pak for Integration
Enterprise
messaging
End-to-end
security
Application
integration
Event
streaming
High speed
data transfer
API
management 2. How we (IBM) architect the product
This presentation is
focused on how we
implemented the product.
The better we architect for
zero trust, the simpler it
will be for customers to use
it securely by default