Skip to Content
Project Zero Trust
book

Project Zero Trust

by George Finney, John Kindervag
October 2022
Intermediate to advanced
224 pages
5h 53m
English
Wiley
Content preview from Project Zero Trust

Glossary

Asserted identity
Identity is always an assertion of the abstraction of a user on a network. The identity system “asserts” that a device is generating packets under the control of the asserted.
Attack surface
An attack surface of an organization is made up of all of the different elements where a threat actor can attempt to exploit weaknesses to obtain unauthorized access into an environment. One strategy for security involves reducing your organization's attack surface; however, in practice this is difficult to do since many services require access to the Internet and consequently the whole world can be an attack surface.
Bring your own device (BYOD)
Many organizations allow employees to bring their own consumer devices into the organization to access company resources or services. For many security teams BYOD comes with the challenge of applying security controls to all the various types of personally owned devices.
Cloud access security broker (CASB)
Many organizations are not able to obtain the same visibility into or control over cloud-based services. CASB services use proxies or API integrations to assist security teams with providing security controls into cloud-based services.
Data, applications, assets, and services (DAAS)

DAAS is an acronym that stands for data, applications, assets, and services, which define the sensitive resources that should go into individual protect surfaces. DAAS elements include:

  • Data—This is sensitive data that can get an ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

In Zero Trust We Trust

In Zero Trust We Trust

Avinash Naduvath
Security Superstream: Zero Trust

Security Superstream: Zero Trust

Chloé Messdaghi, Dr. Wendy Ng, Nicolas Chaillan, Wolfgang Goerlich, Razi Rais
What is a zero trust network?

What is a zero trust network?

Doug Barth, Evan Gilman
Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide

Jason Garbis, Jerry W. Chapman

Publisher Resources

ISBN: 9781119884842Purchase Link