Book Image

Diving into Secure Access Service Edge

By : Jeremiah
Book Image

Diving into Secure Access Service Edge

By: Jeremiah

Overview of this book

The SASE concept was coined by Gartner after seeing a pattern emerge in cloud and SD-WAN projects where full security integration was needed. The market behavior lately has sparked something like a "space race" for all technology manufacturers and cloud service providers to offer a "SASE" solution. The current training available in the market is minimal and manufacturer-oriented, with new services being released every few weeks. Professional architects and engineers trying to implement SASE need to take a manufacturer-neutral approach. This guide provides a foundation for understanding SASE, but it also has a lasting impact because it not only addresses the problems that existed at the time of publication, but also provides a continual learning approach to successfully lead in a market that evolves every few weeks. Technology teams need a tool that provides a model to keep up with new information as it becomes available and stay ahead of market hype. With this book, you’ll learn about crucial models for SASE success in designing, building, deploying, and supporting operations to ensure the most positive user experience (UX). In addition to SASE, you’ll gain insight into SD-WAN design, DevOps, zero trust, and next-generation technical education methods.
Table of Contents (28 chapters)
1
Part 1 – SASE Market Perspective
7
Part 2 – SASE Technical Perspective
15
Part 3 – SASE Success Perspective
20
Part 4 – SASE Bonus Perspective
Appendix: SASE Terms

Service Roles

Each SASE service component may perform one or more separate roles in the SASE service. In one case, the IAM service may serve as the authentication role, while in another, it may serve as the target actor to validate an access request. Each role that's performed must be validated when it's initiated. For example, in real estate transactions, an agent may be a buyer, seller, buyer agent, seller agent, third-party consultant, owner, lender, trustee, mentor, and so on. At the same time, the same real estate agent may be a combination of several roles. This is conceptually like the components in a SASE service as they can play multiple roles, with each role being governed by a separate policy.

A role, subject to change, affects access according to the policy that's being enforced. In one role, a user or system may have full access but have no access in a similar role. For instance, the automated maintenance request system on an office copier machine may...