Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

DevSecOps and Zero Trust Architecture (ZTA) for Multi-Cloud Environments

This 1-day virtual conference will focus on DevSecOps and ZTA as foundational approaches in multi-cloud environments. They facilitate rapid secure application development, promote interoperability, and mitigate threats in a perimeter-less environment. The emphasis will be on delivery of DevSecOps and ZTA constructs through use of a “service mesh architecture” – a high-assurance operational infrastructure. These assurances are made available through new tool sets and open-source SDKs, that, through configuration and API calls, enable features such as mutual TLS, secure service discovery, security monitoring, network resilience and authentication and access control at the client, service, and data level. 

The conference program will feature presentations by experts on service mesh architecture and national leaders in DevSecOps and ZTA deployment, and demonstration of proof of concept use cases in multi-cloud environments. Presentations will address the following themes:

  • Mitigating insider threat and “man in the middle” attacks;
  • DevSecOps and ZTA tools, analysis of effectiveness, and deployment experience;
  • Elimination of tight coupling between code implementing application logic and application services using service proxies; and
  • Supporting agile Authority to Operate (ATO).

For more information regarding this conference, please visit the NIST Conference page at: 

Event Details

Starts: January 27, 2021 - 11:00 AM EST
Ends: January 27, 2021 - 05:30 PM EST

Format: Virtual Type: Conference


Attendance Type: Open to public
Audience Type: Industry,Government,Academia


Virtual Event

Parent Project

See: Cloud Computing
See: DevSecOps

Related Topics

Security and Privacy: access control, general security & privacy, threats, zero trust

Technologies: cloud & virtualization, networks

Applications: enterprise

Created December 08, 2020, Updated December 09, 2020