Appendix DFor Further Reading
Standards, Frameworks, and Other Resources
Center for Internet Security: The 18 CIS Critical Security Controls—www.cisecurity.org/controls/cis-controls-list
Cybersecurity & Infrastructure Security Agency: CISA Tabletop Exercise Packages—www.cisa.gov/cisa-tabletop-exercises-packages
Executive Order on Improving the Nation's Cybersecurity—www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity
NIST Special Publication 800-53 Revision 5: Security and Privacy Controls for Information Systems and Organizations—https://doi.org/10.6028/NIST.SP.800-53r5
NIST Special Publication 800-61 Revision 2: Computer Security Incident Handling Guide—https://doi.org/10.6028/NIST.SP.800-61r2
NIST Special Publication 800-84: Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities—https://doi.org/10.6028/NIST.SP.800-84
NIST Special Publication 800-171 Revision 2: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations—https://doi.org/10.6028/NIST.SP.800-171r2
NIST Special Publication 800-207: Zero Trust Architecture—https://doi.org/10.6028/NIST.SP.800-207
OWASP API Security Project—https://owasp.org/www-project-api-security
OWASP Top 10—https://owasp.org/Top10
Case Studies
Adobe's Case Study on Zero Trust—www.youtube.com/watch?v=IGFhMoRXTqg&t=7s
How Akami Implemented a Zero Trust Security Model—www.akamai.com/us/en/multimedia/documents/case-study/how-akamai-implemented-a-zero-trust-security-model-without-a-vpn.pdf ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access