November 2022
Intermediate to advanced
252 pages
6h 10m
English
This chapter discusses the reference architectures and patterns for implementing the zero trust model. The principles for zero trust are also discussed in detail. We will discuss use cases requiring the zero trust model and how to use the hybrid cloud security patterns to protect critical data using zero trust security practices. The following diagram illustrates the zero trust pattern:
Figure 10.1 – Zero trust pattern
The topics discussed in this chapter include the following:
Read now
Unlock full access