Book Image

Zero Trust Overview and Playbook Introduction

By : Mark Simos, Nikhil Kumar
5 (1)
Book Image

Zero Trust Overview and Playbook Introduction

5 (1)
By: Mark Simos, Nikhil Kumar

Overview of this book

Zero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats. The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards. The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality. This first book in the series helps you understand what Zero Trust is, why it’s important for you, and what success looks like. You’ll learn about the driving forces behind Zero Trust – security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success. By the end of this book, you’ll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust!
Table of Contents (13 chapters)
Free Chapter
2
Chapter 2: Reading the Zero Trust Playbook Series

Introduction to the three pillars

What matters to an organization? The ability to conduct business, achieve its mission, and grow its business.

Doing this in today’s dynamically changing world is like navigating a constantly changing obstacle course. You must have a clear plan to get to your objectives and you must keep moving forward, but you also have to be flexible and adjust based on what you learn on that journey.

To enable this, we recommend using a simple three-pillar model based on The Open Group’s SOA for Business Technology guide (http://www.opengroup.org/soa/source-book/wp_soa4bt/p2.htm).

At its very simplest, this is a plandorun framework, but it has been tailored to Zero Trust and the complex and continuously changing business, technology, and threat environments of today.

This model provides much-needed clarity on how to integrate security and Zero Trust into an organization’s strategy, processes, and daily operations...