Chapter 9. Realizing a Zero Trust Network

This chapter will help readers develop a strategy for taking the knowledge in previous chapters and applying it to their system. Zero trust networks are very likely to be built around existing systems, so this chapter will focus on how to make that transition successfully.

It’s important to remember that zero trust is not a product or even a single service that can be bolted onto the network. It is a set of architectural principles that are applied based on the needs and constraints of the network. Therefore, this chapter cannot provide a checklist of changes to be made, but rather a framework for how to approach realizing a zero trust network in your own system.

The First Steps Toward a Zero Trust Network: Understanding Your Current Network

Thoroughly assessing your network infrastructure is the bedrock of a robust zero trust strategy. Begin by mapping out all network elements, including devices, software, and data flows, to identify security gaps and areas ripe for enhancement. This comprehensive view of your network’s current state is pivotal, providing insights into potential vulnerabilities and informing where and how to apply zero trust principles effectively. This foundational understanding is necessary for any security measures to be aligned with your organization’s specific needs and vulnerabilities that could potentially lead to ineffective defenses and susceptibility to security breaches. The end goal is a clear blueprint of ...

Get Zero Trust Networks, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.