Chapter 5

Enclave Exploration and Consideration

Chapter Key Points

  • All industries and verticals are affected by cyber threats and therefore benefit from the application of Zero Trust to their overall security infrastructure.

  • We touch on applying strategies in applying Zero Trust concepts and view how different industry verticals have applied those specific considerations in their organization’s Zero Trust journey.

Throughout this book, we have and will continue to discuss a model for implementing a Zero Trust design; however, it is inherent that the uniqueness of organizations will require variations within their respective architecture. In this chapter, we discuss and analyze some of the so-called gotchas or unique attributes for organizations ...

Get Zero Trust Architecture now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.