Chapter 7
Zero Trust Common Challenges
Chapter Key Points
Organizations with a goal of segmentation will encounter many challenges throughout their data collection and focus on contextual identity and traffic traversal.
A connection-focused mindset for legacy networks has created a slew of challenges that must be overcome in a Zero Trust Architecture. These challenges can be overcome with proper focus and discovery, while keeping in mind the goal that an organization’s Zero Trust journey is driven by.
Identifying and understanding the identity of devices and using that identity to determine the expected behavior both internally and externally are key to securing devices throughout the network.
Many other, seemingly unrelated processes contribute ...
Get Zero Trust Architecture now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.