Chapter 8
Building a Zero Trust Architecture
After identifying the business drivers and Zero Trust strategy, crafting the right metrics, and assembling a strong Zero Trust team, the next step is to create a Zero Trust architecture for the enterprise to follow and to convert to policies, procedures, and products. To be able to propagate the Zero Trust vision, a blueprint is needed so that all subsequent initiatives follow a common design and implementation procedure. This blueprint must consider and include all the Zero Trust tenets. Zero Trust is an information security model with access control as a strong outcome, so strategies are not limited to a restrictive and fixed path. For example, some strategies may begin enhancement of object access ...
Get In Zero Trust We Trust now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.