© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_19

19. Zero Trust for Identity Security

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

Zero-trust principles and architectures are being widely embraced and adopted by the public and private sector as a security best practice. In fact, zero trust may be the best strategy to protect against identity attack vectors.

Legacy security architectures and network defenses are simply ineffective at managing a world more reliant on the cloud and a remote workforce. In this world, zero-trust principles have become one of the most effective approaches to mitigating ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.