У нас вы можете посмотреть бесплатно Zero Trust Doesn’t Simplify Security — It Multiplies Permissions | Systems Thinking for Architects или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Cloud vendors often present Zero Trust as the modern solution to security complexity. Identity becomes the new perimeter. Every request has an identity. Every identity has permissions. And on paper, that sounds elegant. But in real cloud systems something else happens. As organizations adopt least privilege and identity-centric security, the permission model grows into a complex network of roles, policies, trust relationships, and service integrations. Thousands of identities. Thousands of policies. Thousands of permission edges. Eventually the hardest part of the system is no longer the application. It’s the permission graph. In this video we explore: • Why Zero Trust shifts complexity into identity systems • How IAM policy sprawl emerges in real architectures • Why debugging cloud systems increasingly means debugging permissions • How permission graphs behave like distributed systems • Why identity architecture is becoming a core architectural discipline Zero Trust did not remove security complexity. It relocated it. Into identity graphs. And once identity becomes architecture, architects have to design it like one. Systems Thinking for Architects Architecture is not about best practices. It’s about understanding how system constraints create behavior. Subscribe for new videos on: Architecture myths Cloud architecture trade-offs Event-driven systems Distributed system failure modes AWS architecture analysis