
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Principles, applications, and methodologies to help organizations transition from traditional security models to a Zero Trust approach
Zero Trust Security is a hands-on guide that bridges the gap between Zero Trust theory and real-world practice through a unique and practical approach. Following the journey of a fictional manufacturing company, readers learn how to go from a flat network into a robust Zero Trust architecture. Through step-by-step implementations, the book demonstrates the essential elements of modern security architecture.
Each chapter provides both theoretical understanding and practical implementation guidance. The included Docker environments and configuration files enable readers to practice implementations in a safe environment, making complex security concepts tangible and actionable. For readers just beginning their Zero Trust journey or enhancing existing security controls, this guide offers actionable insights to build a more resilient security architecture.
Additional topics explored in Zero Trust Security include:
- Why perimeter security is inefficient, why Zero Trust projects fail, and how to implement Zero Trust correctly and effectively
- Installation and use of Docker Compose and understanding of Docker Compose .yml files
- Elements of network segmentation including physical and logical segmentation and key technologies
- Techniques for network monitoring such as network taps, switch port analyzers (SPAN), and encrypted traffic
- Identity access management (IAM), covering credential rotation, multi-factor authentication, and single sign-on (SSO)
Zero Trust Security is an essential resource on the subject for IT managers, security architects, DevOps engineers, compliance officers, and cyber security practitioners. The book is also highly valuable for students in related programs of study seeking to understand the latest developments in the field.
Trusted by 375,005 students
Access to over 1 million titles for a fair monthly price.
Study more efficiently using our study tools.
Information
Table of contents
- Cover
- Title Page
- Copyright
- Table of Contents
- Preface
- Acknowledgements
- About the Author
- Introduction
- Chapter 1: Use Case: Juice Factory
- Chapter 2: Zero Trust
- Chapter 3: Docker
- Chapter 4: Initial Design of the Juice Factory Network
- Chapter 5: Network Segmentation and Network Security
- Chapter 6: Network Monitoring
- Chapter 7: Identity Access Management and Jump Box
- Chapter 8: Endpoint Detection and Response
- Chapter 9: Security Information and Event Management
- Chapter 10: Vulnerability Management
- Chapter 11: DevSecOps and Web Protection
- Chapter 12: What About People?
- Chapter 13: Journey from Flat Network to Zero Trust
- Glossary
- Index
- End User License Agreement
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app