Chapter 7

Zero Trust Avengers, Assemble!

Considering the story so far, Zero Trust has been introduced as an information security model and a paradigm shift from the current viewpoint of security. Once the key tenets of Zero Trust are understood, enterprises will spend time identifying the following:

  • Key performance metrics

  • Control gaps in the current architecture measured via CISA maturity model v2

  • Maturity of the enterprise from a Zero Trust process perspective measured by the CMMI maturity model

  • Threats to the key assets

  • Key risk metrics

This chapter demonstrates that Zero Trust cannot be established as a single-vendor project running for a few months. Zero Trust is not just technology; it’s also not just about changing the way we control ...

Get In Zero Trust We Trust now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.