In this session, we’ll take a guided tour of how service mesh, identity-based access management, and secrets management can help implement Zero Trust without increasing development friction. By combining HashiCorp Boundary, Consul, and Vault, we’ll evaluate how these new workflows affect the development process and how we’ve secured the architecture. At the conclusion, you’ll have a better understanding of where you can start implementing a Zero Trust model across users, services, and machines.