February 2021
Intermediate to advanced
306 pages
8h 11m
English
In Part I of the book, we introduced the history and background of Zero Trust, compared a representative enterprise architecture with a Zero Trust architecture, and explored three different Zero Trust case studies. In Part II, we’ll be examining the major functional areas of IT and security infrastructure through our Zero Trust lens. For each, we’ll be discussing its goals and functions, and exploring how these should change and be integrated into your new Zero Trust world.
As we go through this analysis, we’d like you to think about this from the perspective of how Zero Trust can be adopted within your enterprise. Identify the technical and ...
Read now
Unlock full access