5 Threat Modeling/Threat Hunting

DOI: 10.1201/9781003392965-5

So far in this book, we have covered a lot of concepts about the Zero Trust Framework and the components that go into. But it is important to keep in mind that this is a methodology that is designed to work primarily for the internal environment of your business, not the external environment. You can segment out your internal IT and Network environments, but not anything outside of it.

Even despite the resiliency of the Zero Trust Framework, it too can be prone to Cyberattacks and hacks. Therefore, you need to protect this environment, with the tools of both Threat Hunting and Threat Modeling.

It is also important to keep in mind that Threat Modeling also makes use of modern tools ...

Get The Zero Trust Framework now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.