Throughout this book, we’ve examined many different aspects of enterprise security and IT infrastructure. We’ve looked at things from a technical and architectural perspective, and have mentioned various use cases throughout. In this chapter, we’ll be examining seven different scenarios, and discussing how you can evaluate and approach them for inclusion in your Zero Trust program. This is not an exhaustive set of use cases, but does cover most of the major scenarios.
Our goals for this chapter are to arm you with an understanding ...