Linked e-resources
Details
Table of Contents
Intro
Table of Contents
About the Authors
About the Technical Reviewer
Acknowledgments
Foreword
Part I: Overview
Chapter 1: Introduction
Chapter 2: What Is Zero Trust?
History and Evolution
Forrester's Zero Trust eXtended (ZTX) Model
Gartner's Approach to Zero Trust
Our Perspective on Zero Trust
Core Principles
Expanded Principles
A Working Definition
Zero Trust Platform Requirements
Summary
Chapter 3: Zero Trust Architectures
A Representative Enterprise Architecture
Identity and Access Management
Network Infrastructure (Firewalls, DNS, Load Balancers)
Jump Boxes
Privileged Access Management
Network Access Control
Intrusion Detection/Intrusion Prevention
Virtual Private Network
Next-Generation Firewalls
Security Information and Event Management
Web Server and Web Application Firewall
Infrastructure as a Service
Software as a Service and Cloud Access Security Brokers
A Zero Trust Architecture
The NIST Zero Trust Model
A Conceptual Zero Trust Architecture
Policy Components
Types of Policy Enforcement Points
What Is a Policy Enforcement Point?
Zero Trust Deployment Models
Resource-Based Deployment Model
Enclave-Based Deployment Model
Cloud-Routed Deployment Model
Microsegmentation Deployment Model
Summary
Chapter 4: Zero Trust in Practice
Google's BeyondCorp
PagerDuty's Zero Trust Network
The Software-Defined Perimeter and Zero Trust
Mutual TLS Communications
Single-Packet Authorization
SDP Case Study
Zero Trust and Your Enterprise
Summary
Part II: Zero Trust and Enterprise Architecture Components
Chapter 5: Identity and Access Management
IAM in Review
Identity Stores (Directories)
Databases
LDAP
Identity-as-a-Service
Identity Lifecycle
Lifecycle Management
Identity Governance
Access Management
Authentication
LDAP
RADIUS
SAML
OAuth2
OpenID Connect (OIDC)
Certificate-Based Authentication
FIDO2
Mobile and Biometrics
Authorization
Zero Trust and IAM
Authentication, Authorization, and Zero Trust Integration
Enhancing Legacy System Authentication
Zero Trust as Catalyst for Improving IAM
Summary
Chapter 6: Network Infrastructure
Network Firewalls
The Domain Name System
Public DNS Servers
Private DNS Servers
Monitoring DNS for Security
Wide Area Networks
Load Balancers, Application Delivery Controllers, and API Gateways
Web Application Firewalls
Summary
Chapter 7: Network Access Control
Introduction to Network Access Control
Zero Trust and Network Access Control
Unmanaged Guest Network Access
Managed Guest Network Access
Managed vs. Unmanaged Guest Networks: A Debate
Employee BYOD
Device Posture Checks
Device Discovery and Access Controls
Summary
Chapter 8: Intrusion Detection and Prevention Systems
Types of IDPS
Table of Contents
About the Authors
About the Technical Reviewer
Acknowledgments
Foreword
Part I: Overview
Chapter 1: Introduction
Chapter 2: What Is Zero Trust?
History and Evolution
Forrester's Zero Trust eXtended (ZTX) Model
Gartner's Approach to Zero Trust
Our Perspective on Zero Trust
Core Principles
Expanded Principles
A Working Definition
Zero Trust Platform Requirements
Summary
Chapter 3: Zero Trust Architectures
A Representative Enterprise Architecture
Identity and Access Management
Network Infrastructure (Firewalls, DNS, Load Balancers)
Jump Boxes
Privileged Access Management
Network Access Control
Intrusion Detection/Intrusion Prevention
Virtual Private Network
Next-Generation Firewalls
Security Information and Event Management
Web Server and Web Application Firewall
Infrastructure as a Service
Software as a Service and Cloud Access Security Brokers
A Zero Trust Architecture
The NIST Zero Trust Model
A Conceptual Zero Trust Architecture
Policy Components
Types of Policy Enforcement Points
What Is a Policy Enforcement Point?
Zero Trust Deployment Models
Resource-Based Deployment Model
Enclave-Based Deployment Model
Cloud-Routed Deployment Model
Microsegmentation Deployment Model
Summary
Chapter 4: Zero Trust in Practice
Google's BeyondCorp
PagerDuty's Zero Trust Network
The Software-Defined Perimeter and Zero Trust
Mutual TLS Communications
Single-Packet Authorization
SDP Case Study
Zero Trust and Your Enterprise
Summary
Part II: Zero Trust and Enterprise Architecture Components
Chapter 5: Identity and Access Management
IAM in Review
Identity Stores (Directories)
Databases
LDAP
Identity-as-a-Service
Identity Lifecycle
Lifecycle Management
Identity Governance
Access Management
Authentication
LDAP
RADIUS
SAML
OAuth2
OpenID Connect (OIDC)
Certificate-Based Authentication
FIDO2
Mobile and Biometrics
Authorization
Zero Trust and IAM
Authentication, Authorization, and Zero Trust Integration
Enhancing Legacy System Authentication
Zero Trust as Catalyst for Improving IAM
Summary
Chapter 6: Network Infrastructure
Network Firewalls
The Domain Name System
Public DNS Servers
Private DNS Servers
Monitoring DNS for Security
Wide Area Networks
Load Balancers, Application Delivery Controllers, and API Gateways
Web Application Firewalls
Summary
Chapter 7: Network Access Control
Introduction to Network Access Control
Zero Trust and Network Access Control
Unmanaged Guest Network Access
Managed Guest Network Access
Managed vs. Unmanaged Guest Networks: A Debate
Employee BYOD
Device Posture Checks
Device Discovery and Access Controls
Summary
Chapter 8: Intrusion Detection and Prevention Systems
Types of IDPS