10
Building Zero Trust Architecture with Hybrid Cloud Security Patterns
This chapter discusses the reference architectures and patterns for implementing the zero trust model. The principles for zero trust are also discussed in detail. We will discuss use cases requiring the zero trust model and how to use the hybrid cloud security patterns to protect critical data using zero trust security practices. The following diagram illustrates the zero trust pattern:
Figure 10.1 – Zero trust pattern
The topics discussed in this chapter include the following:
- Zero trust model
- Principles of zero trust
- Reference architecture for zero trust
- How to use ...
Get Hybrid Cloud Security Patterns now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.