Book Image

Diving into Secure Access Service Edge

By : Jeremiah
Book Image

Diving into Secure Access Service Edge

By: Jeremiah

Overview of this book

The SASE concept was coined by Gartner after seeing a pattern emerge in cloud and SD-WAN projects where full security integration was needed. The market behavior lately has sparked something like a "space race" for all technology manufacturers and cloud service providers to offer a "SASE" solution. The current training available in the market is minimal and manufacturer-oriented, with new services being released every few weeks. Professional architects and engineers trying to implement SASE need to take a manufacturer-neutral approach. This guide provides a foundation for understanding SASE, but it also has a lasting impact because it not only addresses the problems that existed at the time of publication, but also provides a continual learning approach to successfully lead in a market that evolves every few weeks. Technology teams need a tool that provides a model to keep up with new information as it becomes available and stay ahead of market hype. With this book, you’ll learn about crucial models for SASE success in designing, building, deploying, and supporting operations to ensure the most positive user experience (UX). In addition to SASE, you’ll gain insight into SD-WAN design, DevOps, zero trust, and next-generation technical education methods.
Table of Contents (28 chapters)
1
Part 1 – SASE Market Perspective
7
Part 2 – SASE Technical Perspective
15
Part 3 – SASE Success Perspective
20
Part 4 – SASE Bonus Perspective
Appendix: SASE Terms

SASE Policy

According to the MEF Forum, SASE Policy is defined as “A policy that’s assigned to a SASE Session that determines how a SASE Service handles IP packets in the SASE Session.

It is a defined set of rules for governing action. The policy mechanisms of SASE are leveraged to enforce the desired effect. SASE Policy is essentially a composite collection of policies that are prioritized and start from a position of zero trust. If all communication is denied or blocked until it meets the minimum requirements for authentication and authorization, then the service can effectively support secure communications. Once all the security-focused policy’s requirements have been met and the initiated communications session is allowed in the environment, then policies that forward and direct traffic can ensure that quality, path, performance, and other networking or applications policies are enforced.

At a high level, many SASE policies exist to collectively...