March 2024
Intermediate to advanced
400 pages
12h 26m
English
When the enterprise reaches the implementation phase, essentially the bulk of the work (drivers, design, metrics, and architecture) in the entire Zero Trust lifecycle has been completed. Implementation is a daunting task, but it always follows a predefined plan or guideline that engineers refer to. This is different from designing a concept, a network, or even an access model from scratch. Designing involves a lot of theories and assumptions. The implementation phase is where those assumptions and theories are validated. Overall, the following are some important prerequisite steps before entering this phase:
Clearly understand the reason to move to Zero Trust access models (business drivers). ...
Read now
Unlock full access