Chapter 10. The Adversarial View

The adversarial view assumes that all digital systems are susceptible to compromise and that malicious attackers will persistently attempt to breach them. By understanding this approach, we can assess the probability and ramifications of potential attacks, identify potential vulnerabilities, and ultimately build robust, resilient, and secure systems.

To effectively defend against potential breaches in a zero trust network, organizations must understand how attackers may attempt to bypass security measures. They must also proactively identify weak points to minimize the risk of a successful attack by identifying the entry points most likely to be targeted.

With increasingly sophisticated cyberattacks on the rise, organizations have turned to the zero trust model to protect their systems from malicious activities. While this approach provides greater protection against data breaches, organizations must be aware of potential pitfalls, risks, and attack vectors associated with this model.

In this chapter, we will explore the potential challenges that can arise related to the zero trust model in greater detail. If you were trying to penetrate a zero trust network, how might you do it?

Potential Pitfalls and Dangers

Implementing a zero trust model can present challenges in complexity, time, and cost.

Insufficiently secure authentication measures within organizations can be exploited by attackers, circumventing their effectiveness. Poorly configured ...

Get Zero Trust Networks, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.