February 2021
Intermediate to advanced
306 pages
8h 11m
English
In Part II of this book, we took the Zero Trust principles and architectures from Part I, and used them as our lens to examine a broad set of components across enterprise IT and security architectures. Ranging from on-premises and cloud-based network infrastructure to security and non-security components, this analysis hopefully provided you with a deep understanding of the ways in which Zero Trust can impact your enterprise. This should have armed you with a set of tools, patterns, and perspectives with which you can begin to construct your enterprise’s journey to Zero Trust.
Here in Part III, we’ll be concluding our journey by building on these foundations. We’ll begin with what is in many ...
Read now
Unlock full access