Chapter 5

Implementing Zero Trust

IN THIS CHAPTER

Bullet Shifting from perimeter security

Bullet Understanding the zero trust philosophy

Bullet Getting to know policy based access

Bullet Achieving accountability

Bullet Putting zero trust in place

More than any other framework or technology, the zero trust framework embodies all that is important in defending your network from people trying to break in. For example, DataOps is a good way to build security into your development, and AIOps is an intelligent way to monitor your network from unusual activity, from either attempted security breaches or hardware failures. But zero trust is a more fundamental approach than either of those because it has at its core the idea that people should never be given more security privileges than they need. That means managing access to applications, devices, virtual machines, networks, and data in such a way that everyone must first be

  • Authenticated
  • Validated
  • Continually checked for validation

Managing access is critically ...

Get Cybersecurity All-in-One For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.