Chapter 4

Zero Trust Enclave Design

Chapter Key Points

  • This chapter describes the application of a Zero Trust model to an architecture between different layers of the network, including branch, campus, WAN, data center, and cloud.

  • We address the unique challenges and nuances posed for each layer of the network and considerations when applying Zero Trust concepts.

  • We also explain the impact of vertical industry and regulatory requirements on Zero Trust requirements, implementation specifics, and expected timelines.

The enclaves, as they apply to network and security architecture, come by numerous names and functions. Enclaves are commonly also referred to as zones or segments. Regardless of the terminology used, an enclave is a categorization ...

Get Zero Trust Architecture now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.