Thank you for the thoughtful discussion yesterday. The meeting minutes have been updated and can be found here: https://drive.google.com/drive/folders/1fc9g7vUEuDA3qLDLk-0xoH12e_ZHRkA8
NOTE: Module 3 has been updated with Daniele's suggested text and is highlighted in yellow. Please review the new unit 3.2 and the Dynamic Firewall section in 3.4.
The recording for this meeting and future meetings can be found in the Library of the ZTA SME Circle group, along with the agendas/ meeting minutes, and other relevant ZTA artifacts, such as the charter. The Circle group is invite-only, so if you do not have access to this group, please let us know ASAP and we can get that resolved.
All Modules for the ZTA Training as well as the ZTA Glossary can be found here: https://drive.google.com/drive/folders/1RRq8MTFh19NCxw8bf5FH8Qito31mEC3F?usp=sharing
As a reminder, small groups have started up again. Each of you should've already been assigned to one and invited via a calendar invite. If you did not receive a calendar invite or if you are not assigned to a team please let us know.Note: Team 1 and Team 3 were merged and Team 1 will join Team 3's call on Thursdays. There will be no Team 1 call on Tuesdays moving forward.
Team 2: Wednesday 2pm-3pm (PT): Module 4 - SDP Architectures and Implementation Approaches
Team 1/3: Thursday 8am-9am (PT): Module 3 - SDP Key Features and Technologies
3.1.1- The Shifting Perimeter Challenge
Jake Kline was assigned to review this section by 12/23.
we broke it up into multiple suggestions like you suggested.
Matthew Meersman, please address your analogy comments for this section by 12/23.
1) We need to continue the analogy to show how a bad actor defeats the security implementation.
2) Sentence 3 translates analogy to networking. Sentences 4 and 5 change to threat description.
220.127.116.11- Limitations of the "Connect First, Authenticate Second" Model
Matthew Meersman, please continue to work on this section by 12/23.
18.104.22.168.1- Access before Authentication
Matthew Meersman, please rewrite to include physical building analogy and stay at a consistent level by 12/23
22.214.171.124.2-126.96.36.199.4 Broad Network Connectivity & Exposure
Matthew Meersman, please review this section for structure and make sure it defines the limitations, not the solutions, by 12/23
3.1.4- How SDP Addresses Traditional Architectural Challenges
Leon was assigned to outline how SDP addresses the previous limitations by 12/23.
3.2- Hiding of Infrastructure
Michael Roza and Prasad were assigned to review this section by 12/23
188.8.131.52- Reduced Risk of Forged Certificates
Leon was assigned to add a sentence about OCSP for this subsection by 12/23.
3.5.1- Access Management Monitoring, 5.5.2- Access Management Review
Jake Kline, was assigned to write on these sections by 12/23
3.6- Identity & Access Management & Subsections ( 3.6.1- 184.108.40.206 Cross-domain Identity Management Systems)
Heinrich, Remo, and Michael Herndon will continue rewriting this section and its subsections by 12/23.
They are to communicate and work together via email.
Michael Herndon was assigned to review the SDP and contextualize this section with the SDP by12/23.
3.7- Separately Tunneled Layer Access
Leon was assigned to check this section to ensure this is not repeated in another section by 12/23.
3.8- Network Micro-segmentation
Abhishek Singh, would you please review this section by 12/23.
Assigned to all, Quiz Questions
Thank you to those who have submitted already
Quiz question folder added to volunteer folder so you all can see each other's questions/ see examples :)
Quiz question audit