This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.
Examine fundamental concepts of zero trust security model, including trust engine, policy engine, and context aware agentsUnderstand how this model embeds security within the system's operation, with guided scenarios at the end of each chapterMigrate from a perimeter-based network to a zero trust network in productionExplore case studies that provide insights into organizations' zero trust journeysLearn about the various zero trust architectures, standards, and frameworks developed by NIST, CISA, DoD, and others
Saw this at the library when I was in need of a read. I've been in tech for a long time and even dealt with zero trust networks a bit a decade ago, so I was curious. It's an excellent book for the technically adjacent reader.
There's almost no code, and that's simple. What the book has is detailed descriptions of risks, the designs needed to address the risks, and excellent case studies in each chapters to show real world points about the subject
Simply put, the edge of your business network, usually firewalls, is not sufficient to provide true security in the modern age. You need to take actions to protect communications and data throughout the organization. If you're an IT management, product manager, or in a related position, this is a great starting point.
This book offers an excellent and comprehensive overview of the Zero Trust security model.
However, one notable drawback for me was the lack of concrete examples or tools that could help translate the theory into practice. While the theoretical foundation is strong, the book would have greatly benefited from references to specific software, platforms, or configurations that could serve as a starting point for building a Zero Trust network.