Chapter 2
The Zero Trust Kaleidoscope
Zero Trust is not a new approach to security, but it does need a bolder mindset to tackle. If you survey the entire enterprise landscape, you will find that there are deployments and architectures with various maturities. Some of them are designed with complex threat modeling. Others have simple dot1x to provide network access. These deployments are polar opposites of each other, but what they have in common is static rule-based access control. Zero Trust essentially shifts the focus from this common aspect of all security mechanisms. It can be identified as an amalgamation of most security concepts we already know. An enterprise with an established security portfolio may find the adoption of Zero Trust ...
Get In Zero Trust We Trust now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.