Zero Trust Architecture
- By Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier
- Published Jul 28, 2023 by Cisco Press. Part of the Networking Technology: Security series.
eBook (Watermarked)
- Your Price: $46.39
- List Price: $57.99
- Includes EPUB and PDF
- About eBook Formats
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Also available in other formats.
- Copyright 2024
- Edition: 1st
- eBook (Watermarked)
- ISBN-10: 0-13-789958-0
- ISBN-13: 978-0-13-789958-6
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
A team of Cisco's leading experts and implementers offer the most comprehensive and substantive guide to Zero Trust, bringing clarity, vision, practical definitions, and real-world expertise to a space that's been overwhelmed with hype. The authors explain why Zero Trust identity-based models can enable greater flexibility, simpler operations, intuitive context in the implementation and management of least privilege security. Then, building on Cisco's own model, they systematically illuminate methodologies, supporting technologies, and integrations required on the journey to any Zero Trust identity-based model.
Through real world experiences and case study examples, you'll learn what questions to ask, how to start planning, what exists today, what solution components still must emerge and evolve, and how to drive value in the short-term as you execute on your journey towards Zero Trust.
Table of Contents
Foreword
Introduction
Part I: Concepts
1. Overview of Zero Trust (ZT): It's a Journey
2. Cisco Zero Trust: Security Capability Requirements
3. Zero Trust Reference Architecture and Enclave Design
4. Security Capability Use Cases
5. Segmentation
Part II: Implementation
6. Segmentation Methods: Pros and Cons
7. Segmentation Foundational Functions and Applications (CMDB, App Inv, VLAN, Host Naming)
8. Map Functions to Segments / Implement Solutions
9. Test and Monitor ZT Segmentation and Solutions (LLD / SVS) - Phased
Conclusion (Journey)
Afterword
Bibliography
Acknowledgements
Other Things You Might Like
- Securing Enterprise Networks with Cisco Meraki
- Book $55.99
- In Zero Trust We Trust
- eBook (Watermarked) $34.39