Zero Trust Networks

Razi Rais & Christina Morillo & Evan Gilman & and Doug Barth

Language: English

Published: Oct 4, 2022

Description:

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the “trusted” zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.