Book description
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.
- Examine fundamental concepts of zero trust security model, including trust engine, policy engine, and context aware agents
- Understand how this model embeds security within the system's operation, with guided scenarios at the end of each chapter
- Migrate from a perimeter-based network to a zero trust network in production
- Explore case studies that provide insights into organizations' zero trust journeys
- Learn about the various zero trust architectures, standards, and frameworks developed by NIST, CISA, DoD, and others
Publisher resources
Table of contents
- Preface
- 1. Zero Trust Fundamentals
- 2. Managing Trust
- 3. Context-Aware Agents
- 4. Making Authorization Decisions
- 5. Trusting Devices
- 6. Trusting Identities
- 7. Trusting Applications
-
8. Trusting the Traffic
- Encryption Versus Authentication
- Authenticity Without Encryption?
- Bootstrapping Trust: The First Packet
- Where Should Zero Trust Be in the Network Model?
- The Protocols
- Trusting Cloud Traffic: Challenges and Considerations
- Cloud Access Security Brokers (CASBs) and Identity Federation
- Filtering
- Scenario Walkthrough
- Summary
-
9. Realizing a Zero Trust Network
-
The First Steps Toward a Zero Trust Network: Understanding Your Current Network
- Choosing Scope
- Assessment and Planning
- Requirements: What Is Actually Required?
- All Network Flows MUST Undergo Authentication Before Processing
- Building a System Diagram
- Understanding Your Flows
- Micro-Segmentation
- Software-Defined Perimeter
- Controller-Less Architecture
- “Cheating” with Configuration Management
- Implementation Phase: Application Authentication and Authorization
- Case Studies
- Case Study: Google BeyondCorp
- Case Study: PagerDuty’s Cloud-Agnostic Network
- Summary
-
The First Steps Toward a Zero Trust Network: Understanding Your Current Network
- 10. The Adversarial View
- 11. Zero Trust Architecture Standards, Frameworks, and Guidelines
- 12. Challenges and the Road Ahead
- Appendix. A Brief Introduction to Network Models
- Index
- About the Authors
Product information
- Title: Zero Trust Networks, 2nd Edition
- Author(s):
- Release date: February 2024
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781492096597
You might also like
book
Zero Trust Networks
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind …
book
Security in Computing, 6th Edition
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to …
book
Networking Fundamentals
Become well-versed with basic networking concepts such as routing, switching, and subnetting, and prepare for the …
book
TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition
“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to …