Book Image

Zero Trust Overview and Playbook Introduction

By : Mark Simos, Nikhil Kumar
5 (1)
Book Image

Zero Trust Overview and Playbook Introduction

5 (1)
By: Mark Simos, Nikhil Kumar

Overview of this book

Zero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats. The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards. The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality. This first book in the series helps you understand what Zero Trust is, why it’s important for you, and what success looks like. You’ll learn about the driving forces behind Zero Trust – security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success. By the end of this book, you’ll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust!
Table of Contents (13 chapters)
Free Chapter
2
Chapter 2: Reading the Zero Trust Playbook Series

Key Zero Trust capabilities

To enable Zero Trust to integrate into business processes, we will describe the Zero Trust capabilities that this reference model enables. These capabilities make this model real by defining consistent outcomes that Zero Trust delivers to the organization over the years to come.

What are capabilities? Most organizations provide goods or services that are valuable to their customers (or clients, citizens, constituents, community, and so on). To provide these goods or services consistently over time, they need to define durable capabilities. Examples of capabilities include being able to price a product, deliver a product or service, log people in securely, or respond to a cybersecurity attack.

Capabilities capture what we are doing and abstract away from how things are done (which changes over time and varies between organizations). Many details of Zero Trust implementation will evolve over time as new ideas emerge and new components and technologies...