This book gives readers the tools, skills, and vocabulary they need to be able to successfully promote, create, and execute a Zero Trust initiative in their enterprise. With this book, readers will be able to:
- Communicate the business value of Zero Trust
- Explain why the business has an imperative to adopt it
- Recruit supporters and allies across the enterprise
- Choose the most appropriate “on-ramp” project for their enterprise
- Identify technical and non-technical prerequisites
- Identify and eliminate barriers to success
- Avoid common challenges
Who this Book is for:
This book is targeted at:
- Security practitioners and security leaders at all levels
- People who are responsible for a Zero Trust initiative or who want to lead one
- Security professionals who are looking for guidance in the design and execution of a Zero Trust program
- People struggling to get started with Zero Trust in their enterprise
Table of Contents
- Introduction
- Who This Book Is For
- Diagrams and Visual Language
- What Does a Successful Zero Trust Initiative Look Like?
- What is Zero Trust?
- Current Zero Trust Frameworks
- Selling your Enterprise on the Value of Zero Trust
- Security Audiences
- IT Audiences
- Technical Audiences
- Business Audiences
- Zero Trust Prerequisites
- Zero Trust On-Ramps
- Zero Trust On-Ramp: VPN Replacement
- Zero Trust On-Ramp: Cloud Migration
- Zero Trust On-Ramp: DevOps
- Zero Trust On-Ramp: Administrator Access
- Zero Trust On-Ramp: Business Process-Driven Access
- Other On-Ramps
- Areas to Avoid
- Zero Trust Policies
- What to Learn From Your First Zero Trust Project
- Conclusion
- Bibliography
Note: Payments securely processed via Stripe