| Author Biographies |
|
xvii | |
| Foreword |
|
xx | |
| Acknowledgment |
|
xxii | |
| Introduction |
|
1 | (6) |
|
What Is Unique about This Book? |
|
|
2 | (3) |
|
|
|
5 | (2) |
|
PART 1 History, Introduction, and Fundamentals of Zero Trust |
|
|
7 | (48) |
|
1 History of and Introduction to Zero Trust |
|
|
9 | (33) |
|
|
|
10 | (1) |
|
|
|
10 | (1) |
|
1.3 The Inception of Zero Trust Concept |
|
|
11 | (16) |
|
1.3.1 Cloud Security Alliance's Software Define Perimeter and Zero Trust |
|
|
13 | (1) |
|
1.3.2 Google's BeyondCorp Zero Trust Model |
|
|
14 | (1) |
|
1.3.3 Gartner's CARTA Framework for Zero Trust |
|
|
15 | (2) |
|
1.3.3.1 CARTA'S Zero Trust Implementation Approach |
|
|
17 | (1) |
|
1.3.4 Netflix's LISA Model for Zero Trust |
|
|
18 | (1) |
|
|
|
18 | (1) |
|
1.3.5 Forrester's ZTX Framework |
|
|
19 | (3) |
|
1.3.6 NIST SP 800:207 Zero Trust Framework |
|
|
22 | (1) |
|
1.3.6.1 NIST's Zero Trust Architecture Foundation |
|
|
22 | (2) |
|
|
|
24 | (1) |
|
1.3.6.3 Policy Administrator |
|
|
24 | (1) |
|
1.3.6.4 Policy Enforcement Point |
|
|
24 | (1) |
|
1.3.7 The Open Group Zero Trust's Approach |
|
|
24 | (1) |
|
1.3.7.1 Key Requirements for Zero Trust as per the Open Group |
|
|
25 | (1) |
|
1.3.7.2 Organizational Value and Risk Alignment |
|
|
25 | (1) |
|
1.3.7.3 Guardrails and Governance |
|
|
25 | (2) |
|
|
|
27 | (1) |
|
1.3.7.5 Security Controls |
|
|
27 | (1) |
|
1.3.8 Microsoft's Zero Trust Principles |
|
|
27 | (1) |
|
1.4 Why Zero Trust Is Important |
|
|
27 | (1) |
|
1.5 Benefits of Zero Trust |
|
|
28 | (2) |
|
1.6 Zero Trust Principle Redefined |
|
|
30 | (2) |
|
1.6.1 Re-Examine All Default Access Controls |
|
|
30 | (1) |
|
|
|
30 | (1) |
|
1.6.3 Preventing Lateral Movement |
|
|
31 | (1) |
|
1.6.4 Leverage a Variety of Preventative Techniques |
|
|
31 | (1) |
|
1.6.5 Enable Real-Time Monitoring and Controls to Identify and Halt Malicious Activity Quickly |
|
|
32 | (1) |
|
1.6.6 Align to the Broader Security Strategy |
|
|
32 | (1) |
|
1.7 Zero Trust for Everyone |
|
|
32 | (6) |
|
|
|
33 | (1) |
|
|
|
33 | (3) |
|
1.7.3 Small and Medium Businesses |
|
|
36 | (1) |
|
|
|
37 | (1) |
|
|
|
38 | (4) |
|
2 Zero Trust -- Disrupting the Business Model |
|
|
42 | (13) |
|
2.1 Why Business Leaders Care about Zero Trust |
|
|
42 | (2) |
|
2.1.1 Agility Fuels Digital Transformation |
|
|
42 | (1) |
|
2.1.2 The New (Reduced) Cost of Doing Business |
|
|
43 | (1) |
|
2.1.3 Business Leaders' Commitment to Support Zero Trust Adoption |
|
|
44 | (1) |
|
2.2 Zero Trust Starts with a Culture |
|
|
44 | (2) |
|
2.2.1 Know Your Organization |
|
|
44 | (1) |
|
|
|
45 | (1) |
|
2.2.3 Managing Up and Around |
|
|
45 | (1) |
|
2.2.4 A Philosophy of Ownership |
|
|
46 | (1) |
|
2.3 Paradigm Shift in the Business Model |
|
|
46 | (1) |
|
2.4 Zero Trust Security Is Vital for Hybrid Work |
|
|
47 | (2) |
|
2.5 Human Elements of Zero Trust |
|
|
49 | (3) |
|
2.5.1 Role of the Chief Information Officer |
|
|
50 | (1) |
|
2.5.2 Role of Security Professionals |
|
|
51 | (1) |
|
2.5.3 Using a Zero Trust Framework to Solve the Skills Gap |
|
|
51 | (1) |
|
|
|
52 | (1) |
|
|
|
52 | (3) |
|
PART 2 Current Status and Best Practices of the Zero Trust Journey |
|
|
55 | (128) |
|
3 Zero Trust Maturity and Implementation Assessment |
|
|
57 | (18) |
|
3.1 Need for a Zero Trust Maturity Model |
|
|
57 | (1) |
|
3.2 Our Unique Approach to a Zero Trust Maturity Model |
|
|
57 | (8) |
|
3.2.1 Zero Trust Cybersecurity Maturity Assessment Toolkit |
|
|
60 | (2) |
|
3.2.2 How to Use the Zero Trust Cybersecurity Maturity Assessment Tool? |
|
|
62 | (3) |
|
3.3 Microsoft's Three-Stage Maturity Model |
|
|
65 | (5) |
|
3.3.1 Zero Trust Assessment Using Microsoft Compliance Manager |
|
|
68 | (1) |
|
3.3.1.1 First Thing First: What Is Compliance Manager? |
|
|
68 | (1) |
|
3.3.1.2 Zero Trust Integration for the Data Protection Baseline Template |
|
|
68 | (2) |
|
3.4 CISA's Zero Trust Maturity Model |
|
|
70 | (1) |
|
3.5 Forrester's ZTX Security Maturity Model |
|
|
71 | (1) |
|
3.6 Palo Alto Zero Trust Maturity Assessment Model |
|
|
72 | (1) |
|
|
|
73 | (2) |
|
4 Identity Is the New Security Control Plane |
|
|
75 | (33) |
|
4.1 Why Identities and Why Now? |
|
|
75 | (1) |
|
4.2 Identity -- Building Trust in the Digital World |
|
|
76 | (2) |
|
4.3 Implementation Pillars |
|
|
78 | (15) |
|
|
|
78 | (1) |
|
4.3.1.1 Zero Trust Principle |
|
|
78 | (1) |
|
4.3.1.2 Architecture Placement |
|
|
78 | (2) |
|
|
|
80 | (1) |
|
4.3.1.4 Actionable Questions Checklist |
|
|
80 | (2) |
|
4.3.1.5 Additional Focus Points and Considerations |
|
|
82 | (1) |
|
|
|
82 | (1) |
|
4.3.1.5.2 Web and Non-Web Perspectives |
|
|
82 | (1) |
|
4.3.1.5.3 Service Accounts |
|
|
82 | (1) |
|
|
|
83 | (1) |
|
4.3.2.1 Zero Trust Principle |
|
|
83 | (1) |
|
4.3.2.2 Architecture Placement |
|
|
83 | (2) |
|
|
|
85 | (1) |
|
4.3.2.3.1 Behavioral Baseline Flow (Learning Phase) |
|
|
85 | (1) |
|
4.3.2.3.2 Single Authentication Flow |
|
|
85 | (1) |
|
4.3.2.4 Actionable Questions Checklist |
|
|
85 | (1) |
|
4.3.2.5 Additional Focus Points and Considerations |
|
|
86 | (1) |
|
4.3.2.5.1 Complete Authentication Trail |
|
|
86 | (1) |
|
4.3.2.5.2 Behavioral Profile |
|
|
86 | (1) |
|
4.3.2.5.3 Unified Risk Analysis |
|
|
86 | (1) |
|
|
|
87 | (1) |
|
4.3.3.1 Zero Trust Principle |
|
|
87 | (1) |
|
4.3.3.2 Architecture Placement |
|
|
87 | (1) |
|
|
|
87 | (2) |
|
4.3.3.4 Actionable Questions Checklist |
|
|
89 | (1) |
|
4.3.3.5 Additional Focus Points and Considerations |
|
|
89 | (1) |
|
4.3.3.5.1 Complete Environment Coverage |
|
|
89 | (1) |
|
4.3.3.5.2 Access Policies Zoom-In |
|
|
89 | (1) |
|
4.3.3.5.3 Rule-Based Policies |
|
|
89 | (1) |
|
4.3.3.5.4 Pattern-Based Policies |
|
|
90 | (1) |
|
4.3.3.5.5 Risk-Based Policies |
|
|
90 | (1) |
|
|
|
90 | (1) |
|
4.3.4.1 Zero Trust Principle |
|
|
91 | (1) |
|
4.3.4.2 Architecture Placement |
|
|
91 | (1) |
|
|
|
91 | (1) |
|
4.3.4.4 Actionable Questions Checklist |
|
|
91 | (1) |
|
4.3.4.5 Additional Focus Points and Considerations |
|
|
91 | (1) |
|
4.3.4.5.1 Resource vs. Network Segment |
|
|
91 | (1) |
|
4.3.4.5.2 From Segment to Resource |
|
|
91 | (2) |
|
4.3.4.5.3 From Resource to Access Attempt |
|
|
93 | (1) |
|
4.3.4.5.4 Recap of the Assume Breach Component |
|
|
93 | (1) |
|
4.4 Priorities for Modernizing Identity |
|
|
93 | (12) |
|
4.4.1 Priority 1: Unify Identity Management |
|
|
94 | (1) |
|
4.4.1.1 Control 1.1: Enable Single Sign-On |
|
|
95 | (1) |
|
4.4.1.2 Control 1.2: External Identities |
|
|
96 | (1) |
|
4.4.1.3 Control 1.3: Enable Passwordless Approach When Possible |
|
|
96 | (1) |
|
4.4.1.4 Control 1.4: Automatic Provisioning |
|
|
97 | (1) |
|
4.4.1.5 Control 1.5: Device Integration |
|
|
97 | (1) |
|
4.4.1.6 Control 1.6: Managed Identities |
|
|
98 | (1) |
|
4.4.2 Priority 2: Implement Secure Adaptive Access |
|
|
98 | (1) |
|
4.4.2.1 Control 2.1: Secure Adaptive Authentication |
|
|
98 | (2) |
|
4.4.2.2 Control 2.2: Block Legacy Authentication |
|
|
100 | (1) |
|
4.4.2.3 Control 2.3: Protect Against Consent Phishing |
|
|
100 | (1) |
|
4.4.2.4 Control 2.4: Equal Focus on On-Prem Identity |
|
|
101 | (1) |
|
4.4.3 Priority 3: Identity and Access Governance |
|
|
101 | (1) |
|
4.4.3.1 Control 3.1: Automate Provisioning and De-Provisioning |
|
|
102 | (1) |
|
4.4.3.2 Control 3.2: Access Lifecycle Management and Separation of Duties |
|
|
103 | (1) |
|
4.4.3.3 Control 3.3: Follow the Least Privilege Principle |
|
|
103 | (1) |
|
4.4.4 Priority 4: Integrate and Monitor |
|
|
104 | (1) |
|
4.4.4.1 Control 4.1: Log and Operationalize Identity Monitoring |
|
|
104 | (1) |
|
4.4.4.2 Control 4.2: Integrate Identity for Auto Detection and Response |
|
|
104 | (1) |
|
|
|
105 | (3) |
|
5 Zero Trust Architecture Components |
|
|
108 | (59) |
|
5.1 Zero Trust Components Overview |
|
|
108 | (2) |
|
5.2 Implementation Approach and Objectives |
|
|
110 | (1) |
|
|
|
111 | (1) |
|
5.4 Zero Trust in Multi-Cloud and Hybrid Environments |
|
|
111 | (5) |
|
5.4.1 Customer Case Study: Zero Trust in the Hybrid Environment |
|
|
112 | (1) |
|
5.4.1.1 About the Organization |
|
|
112 | (1) |
|
5.4.1.2 Current Challenges |
|
|
112 | (2) |
|
5.4.1.3 Top Three Challenges Faced While Implementing New Zero Trust Architecture |
|
|
114 | (1) |
|
5.4.1.4 Impact and Benefits Achieved by a Zero Trust Project |
|
|
114 | (2) |
|
5.5 Secure Access Service Edge and Zero Trust |
|
|
116 | (7) |
|
5.5.1 Secure Access Service Edge Architecture Overview |
|
|
117 | (2) |
|
5.5.1.1 Policy Evaluation and Enforcement Points |
|
|
119 | (1) |
|
5.5.1.2 Microsoft Capabilities |
|
|
119 | (2) |
|
5.5.2 Customer Case Study: Secure Access Service Edge Implementation |
|
|
121 | (1) |
|
5.5.2.1 Current Situation and Current Challenges |
|
|
121 | (1) |
|
5.5.2.2 Technology Solutions Used to Overcome the Challenges |
|
|
122 | (1) |
|
5.5.2.3 Impact and Benefits Achieved |
|
|
122 | (1) |
|
|
|
123 | (10) |
|
5.6.1 Identity Architecture Overview |
|
|
124 | (1) |
|
5.6.1.1 Silverfort and Azure AD Integrated Identity Zero Trust Solution |
|
|
124 | (1) |
|
|
|
125 | (1) |
|
5.6.1.3 Silverfort's "Bridging" Capability |
|
|
126 | (1) |
|
|
|
126 | (1) |
|
|
|
126 | (1) |
|
|
|
126 | (2) |
|
5.6.1.7 Illustrative Example: Protecting PowerShell to Domain Controller Access |
|
|
128 | (2) |
|
5.6.2 Customer Case Study: Unified Identity Management with Zero Trust |
|
|
130 | (1) |
|
5.6.2.1 About the Organization |
|
|
130 | (1) |
|
5.6.2.2 Current Challenges |
|
|
130 | (1) |
|
5.6.2.3 Technology Solutions Used to Overcome Existing Challenges |
|
|
131 | (1) |
|
5.6.2.4 Top Three Challenges Faced While Implementing New Zero Trust Architecture |
|
|
131 | (1) |
|
5.6.2.5 Benefits Achieved by Implementing Zero Trust Architecture |
|
|
131 | (2) |
|
5.7 Endpoint or Devices Component |
|
|
133 | (6) |
|
5.7.1 Endpoint or Devices Architecture Overview |
|
|
133 | (4) |
|
5.7.1.1 Customer Case Study: Unified Endpoint or Device Management with Zero Trust |
|
|
137 | (1) |
|
5.7.1.1.1 About the Organization |
|
|
137 | (1) |
|
5.7.1.1.2 Current Challenges |
|
|
137 | (1) |
|
5.7.1.1.3 Technology Solutions Used to Over the Challenges |
|
|
137 | (1) |
|
5.7.1.1.4 Top 5 Challenges Faced While Implementing New Zero Trust Architecture |
|
|
138 | (1) |
|
5.7.1.1.5 Impact and Benefits Achieved with Zero Trust Architecture |
|
|
138 | (1) |
|
5.8 Application Component (on Prem, Legacy, Cloud, Mobile App) |
|
|
139 | (4) |
|
5.8.1 Application Architecture Overview |
|
|
140 | (3) |
|
|
|
143 | (7) |
|
5.9.1 Data Architecture Overview |
|
|
144 | (1) |
|
5.9.1.1 Mobile Application Management |
|
|
144 | (2) |
|
5.9.1.2 End-to-End Encryption for Data Protection |
|
|
146 | (2) |
|
5.9.2 Customer Case Study: Data Loss Prevention and Data Security Zero Trust |
|
|
148 | (1) |
|
5.9.2.1 About the Organization |
|
|
148 | (1) |
|
5.9.2.2 Current Situation Before the Zero Trust Model |
|
|
148 | (1) |
|
5.9.2.3 Technology Solutions Used for Zero Trust Architecture |
|
|
148 | (1) |
|
5.9.3 Top Three Challenges Faced While Implementing New Zero Trust Architecture |
|
|
149 | (1) |
|
5.9.4 Impact and Benefits with Zero Trust Architecture |
|
|
150 | (1) |
|
5.10 Infrastructure Component |
|
|
150 | (6) |
|
5.10.1 Infrastructure Deployment Objectives |
|
|
150 | (1) |
|
|
|
151 | (1) |
|
5.10.3 Network Architecture Overview |
|
|
152 | (1) |
|
5.10.3.1 Segment and Enforce the External Boundaries |
|
|
152 | (1) |
|
5.10.3.2 Network Segmentation |
|
|
152 | (2) |
|
5.10.3.3 Threat Protection |
|
|
154 | (1) |
|
|
|
155 | (1) |
|
5.11 Zero Trust and Operational Technology Component |
|
|
156 | (3) |
|
5.11.1 A Practical Approach for Deploying Zero Trust for Operational Technology |
|
|
156 | (1) |
|
5.11.2 Internet of Things and Operational Technology Architecture with Zero Trust Principles |
|
|
157 | (2) |
|
5.12 Zero Trust and Security Operation Center |
|
|
159 | (1) |
|
5.12.1 Security Operation Center Automation and Orchestration with Zero Trust |
|
|
159 | (1) |
|
5.12.2 Security Operation Center Architecture Components |
|
|
160 | (1) |
|
5.13 Defining DevOps in a Zero Trust World |
|
|
160 | (5) |
|
5.13.1 Customer Case Study: DevOps and Application Security with Zero Trust |
|
|
162 | (1) |
|
5.13.1.1 About the Organization |
|
|
162 | (1) |
|
5.13.1.2 Current Situation and Current Challenges prior to Zero Trust Implementation |
|
|
163 | (1) |
|
5.13.1.2.1 Mergers and Acquisitions |
|
|
163 | (1) |
|
5.13.1.2.2 Office Engineering |
|
|
163 | (1) |
|
5.13.1.3 Technology Solutions Used for Zero Trust Architecture |
|
|
163 | (1) |
|
5.13.1.4 Top Three Challenges Faced While Implementing New Zero Trust Architecture |
|
|
164 | (1) |
|
5.13.1.5 Impact and Benefits of Zero Trust |
|
|
164 | (1) |
|
|
|
165 | (2) |
|
6 Zero Trust Project Plan and Program Approach |
|
|
167 | (16) |
|
|
|
167 | (1) |
|
6.2 Working Together as One Team |
|
|
168 | (1) |
|
6.3 Journey to Zero Trust |
|
|
168 | (1) |
|
6.4 Phase 1: Project Planning and Strategy Consideration |
|
|
169 | (3) |
|
6.4.1 Phase 1.1: Is Zero Trust Project Right for You? |
|
|
169 | (1) |
|
6.4.2 Phase 1.2: Build Your Strategy and Approach Using the Right Zero Trust Framework |
|
|
169 | (2) |
|
6.4.3 Phase 1.3: Secure Support and Buy-In from All Stakeholders |
|
|
171 | (1) |
|
6.4.4 Phase 1.4: Identify Key Interdependencies Across the Organization |
|
|
172 | (1) |
|
6.5 Phase 2: Zero Trust Maturity Level and Project Roadmap |
|
|
172 | (1) |
|
6.5.1 Phase 2.1: Building the Zero Trust Project Roadmap |
|
|
172 | (1) |
|
6.6 Phase 3: Zero Trust Components Implementation Roadmap |
|
|
173 | (4) |
|
6.6.1 Phase 3.1: Create a Roadmap to Increase Maturity for the Identity Domain |
|
|
173 | (1) |
|
6.6.2 Phase 3.2: Create a Roadmap to Increase Maturity for the Endpoint Domain |
|
|
174 | (1) |
|
6.6.3 Phase 3.4: Create a Roadmap to Increase Maturity for the Application Domain |
|
|
174 | (1) |
|
6.6.4 Phase 3.5: Create a Roadmap to Increase Maturity for the Data Domain |
|
|
174 | (1) |
|
6.6.5 Phase 3.6: Create a Roadmap to Increase Maturity for the Network Domain |
|
|
175 | (1) |
|
6.6.6 Phase 3.7: Create a Roadmap to Increase Maturity for the Infrastructure Domain |
|
|
176 | (1) |
|
6.6.7 Phase 3.8: Create a Roadmap to Increase Maturity for the Visibility, Analytics, Automation, and Orchestration Domains |
|
|
176 | (1) |
|
6.7 Phase 4: Continuous Evaluation and Project Monitoring |
|
|
177 | (1) |
|
6.8 Good, Bad and Ugly -- Learnings from Early Adoption of Zero Trust |
|
|
177 | (3) |
|
|
|
180 | (3) |
|
PART 3 Future Horizon of Zero Trust |
|
|
183 | (20) |
|
7 Future Horizon of Zero Trust |
|
|
185 | (18) |
|
7.1 Enabling Zero Trust with Artificial Intelligence |
|
|
185 | (3) |
|
7.1.1 Role of Artificial Intelligence from Zero Trust to Zero Authentication |
|
|
187 | (1) |
|
7.2 Blockchain Technology as Zero Trust Enabler |
|
|
188 | (4) |
|
7.2.1 Blockchain Technology |
|
|
188 | (3) |
|
7.2.2 Decentralized Finance |
|
|
191 | (1) |
|
7.3 Embracing Zero Trust for the Internet of Things and Operational Technology |
|
|
192 | (5) |
|
7.3.1 Cybersecurity for the Internet of Things |
|
|
193 | (2) |
|
7.3.2 A Practical Approach for Implementing Zero Trust for the Internet of Things |
|
|
195 | (2) |
|
7.4 Zero Trust in Governance, Risk, and Compliance |
|
|
197 | (3) |
|
7.4.1 Zero Trust Is the Best Digital Risk Management Approach |
|
|
198 | (2) |
|
7.4.2 The Convergence of Data Governance and Zero Trust |
|
|
200 | (1) |
|
|
|
200 | (3) |
| Index |
|
203 | |