hands-on lab

Building Zero Trust 
for Cloud Workloads

Welcome to the “Building Zero Trust with Workload Communications” hands-on lab!

Zscaler Workload Communications allows you to securely connect applications anywhere to minimize the attack surface, prevent lateral movement, and reduce the risk of bad actors gaining access to your data by leveraging a zero trust architecture for effective workload security.

Our Platform

Connecting workloads to the internet across different networks doesn't have to be difficult.

With Zscaler Workload Communications, you can take advantage of a cloud native zero trust access service that provides a fast, simple, and safe approach to app-to-app and app-to-internet connectivity across multicloud environments.

Integrated, automated connectivity and security from Zscaler reduces complexity and cost with a smarter, more efficient, and more secure alternative to legacy network solutions.

Overview

Workload Communications Overview

Learn how to navigate and set up Zscaler Workload Communications to start securing your workloads in

Dashboard and Navigation
Dashboard and Navigation

Explore the Cloud Connector Portal, where you can access and manage your Cloud Connectors and policies.

Provisioning and Template Management
Provisioning and Template Management

Examine how you can use location and provisioning templates to register your Cloud Connectors and start securing your cloud workloads.

Traffic Forwarding
Traffic Forwarding

Discover how to easily configure workload traffic policies.

Analytics and Logging
Analytics and Logging

Walk through how you can gain greater insight into your workload traffic.

In Action

Workload Communications in Action

Examine various cyberthreat prevention use cases for Zscaler Workload Communications.

Enforcing Minimum TLS Versions
Enforcing Minimum TLS Versions

Learn how to set up policies to enforce minimum TLS versions to secure cloud workloads.

Protecting Against Malicious Payloads, Phishing, and Botnets
Protecting Against Malicious Payloads, Phishing, and Botnets

See the comprehensive protection Zscaler Workload Communications offers right out of the box.

Enforcing a Data Loss Prevention Policy
Establishing a Data Loss Prevention Policy

Discover the power of Zscaler Data Loss Prevention to protect against data exfiltration.

Controlling Access to Specific Resources on Websites
Controlling Access to Specific Resources on Websites

Walk through how you can gain granular control over access to specified websites.

Coming Soon

Coming Soon

New Zscaler Workload Communications innovations will soon be part of our hands-on lab experiences—st

Workload Communications - AWS Tagging
Workload Communications - AWS Tagging

Discover how to implement policy using AWS tagging for Workload Communications.

Workload Communications - VDI Agent
Workload Communications - VDI Agent

Examine the VDI agent for Workload Communications.

Workload Communications - AWS Auto Scale Group
Workload Communications - AWS Auto Scale Group

See how the AWS auto scale functionality enhances Zscaler Workload Communications.