Chapter 5
Implementing Zero Trust
IN THIS CHAPTER
Shifting from perimeter security
Understanding the zero trust philosophy
Getting to know policy based access
Achieving accountability
Putting zero trust in place
More than any other framework or technology, the zero trust framework embodies all that is important in defending your network from people trying to break in. For example, DataOps is a good way to build security into your development, and AIOps is an intelligent way to monitor your network from unusual activity, from either attempted security breaches or hardware failures. But zero trust is a more fundamental approach than either of those because it has at its core the idea that people should never be given more security privileges than they need. That means managing access to applications, devices, virtual machines, networks, and data in such a way that everyone must first be
- Authenticated
- Validated
- Continually checked for validation
Get Cybersecurity All-in-One For Dummies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.